LDAPDomainDump


┌──(kali㉿kali)-[~/…/htb/labs/forest/ldapdomaindump]
└─$ ldapdomaindump ldap://$IP:389 -u 'htb.local\svc-alfresco' -p s3rvice -n $IP --no-json --no-grep
[*] Connecting to host...
[*] Binding to host
[+] Bind OK
[*] Starting domain dump
[+] Domain dump finished

With a valid credential, I can now request a domain dump data with LDAPDomainDump to see the general view about the domain. A bird-eye picture view if you like.

Machine Account


It would appear that there is another machine within the domain EXCH01.htb.local appears to be a Microsoft Exchange server

Groups


There are a lot more groups than what’s shown in the screenshot above. The 3 groups from the top aren’t part of the installation default. They are user-created groups I can see some other groups that are related to the Exchange server.

Users


A nice list of domain users. I can also see the svc-alfresco user with the DON'T REQ PREAUTH flag, which I exploited earlier Those usernames starting with HealthMailbox are likely relevant to the Exchange server

The$331000-VK4ADACQNUCA account turns out to be service account for the Exchange server. I was initially wondering what it was.

Now that I have seen the domain on the general term, I need to prepare for an attack route