ldapdomaindump
Using the credential of the support
user, dumping domain information with ldapdomaindump
┌──(kali㉿kali)-[~/…/htb/labs/blackfield/ldapdomaindump]
└─$ ldapdomaindump ldap://dc01.blackfield.local:389 -u 'BLACKFIELD.LOCAL\support' -p '#00^BlackKnight' -n $IP --no-json --no-grep
[*] Connecting to host...
[*] Binding to host
[+] Bind OK
[*] Starting domain dump
[+] Domain dump finished
Dump finished
Computers
The DC host,
dc01.blackfield.local
, appears to be the solely active computer account
Users
While I won’t be listing out the entire table of domain users, I have found an interesting fact
Those [[Blackfield_RID_Cycling#[RID Cycling](https //www.trustedsec.com/blog/new-tool-release-rpc_enum-rid-cycling-attack/)|enumerated user accounts]] from the RID cycling technique, starting with
BLACKFIELD******
, have both CN
and name
attributes matching up the usernames found in the //dc01.blackfield.local/profiles$
share
It would appear that firstname is redacted to first letter only
Updating the users.txt
file
Additionally, the
lydericlefebvre
user has the description
field populated with the following; @lydericlefebvre - VM Creator
Groups
While the whole table of the target domain groups are redacted, there isn’t any none default domain group
svc_backup
However, it is worth noting that
svc_backup
account with memberships to both Remote Management Users
and Backup Operators
groups makes it a valuable target