๐ดBlackfield

Enumeration
IP
We have a Windows DC with domain BLACKFIELD.local
Enumerating SMB we find two custom shares

We don't have permission to read the forensics share
In the profiles$ share there are a lot of users

We can copy all the users and make a list

3 users are correct, and the support account is AS-REP roastable

The TGT that kerbrute gives is not suitable for hashcat, so we need to use GetNPUsers

And we got a password

Lateral movement
With bloodhound we find a svc_backup account that is a backup operator
And the support account can the force a password change on audit2020


Now we can read the forensic share

Privilege escalation
We find a LSASS dump inside the share

The hashes of the DC machine account and Administrator do not work, but the svc_backup one is correct
Now with this privileges we can copy the system, security and sam hives from the dc


Now we can parse the hives and DCSync the DC using the machine account hash

Last updated