Lustrous (chain) (medium)

port scan

service enumeration

ftp allow anonymous login

some user directory

have a users.csv

ASREPRoast

ben.cox user lack of Kerberos pre-authentication

we can winrm into LUSMS

privilege escalation on lusms

there have admin.xml (PSCred)

we can use those powershell command get plain password

spn user

there are some service account

hashcat

now we have svc_web password

convert to hash

silver ticket

the tony.ward is backup

we can use rubeus to make a silver ticket login web page as tony.ward user. (those sid/id get from bloodhound)

abuse backup admin

there have a code can remote dump sam with backup user

https://github.com/Wh04m1001/Random/blob/main/BackupOperators.cpp

compile code

those file will save at dc machine

we can use smbclient download those file

use pypykatz to get dc machine hash

dump all!

Last updated