Resourced

Nmap output

Nmap scan report for 192.168.213.175
Host is up (0.061s latency).
Not shown: 65515 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-10-19 14:46:19Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: resourced.local0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: resourced.local0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2025-10-19T14:47:47+00:00; 0s from scanner time.
| rdp-ntlm-info: 
|   Target_Name: resourced
|   NetBIOS_Domain_Name: resourced
|   NetBIOS_Computer_Name: RESOURCEDC
|   DNS_Domain_Name: resourced.local
|   DNS_Computer_Name: ResourceDC.resourced.local
|   DNS_Tree_Name: resourced.local
|   Product_Version: 10.0.17763
|_  System_Time: 2025-10-19T14:47:07+00:00
| ssl-cert: Subject: commonName=ResourceDC.resourced.local
| Issuer: commonName=ResourceDC.resourced.local
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-10-18T14:44:19
| Not valid after:  2026-04-19T14:44:19
| MD5:   4a73:788f:a2e5:8576:20cf:b582:6dd6:b801
|_SHA-1: 41a0:c018:0fa2:1381:dd40:7f68:b37f:2506:9f6b:7b1d
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49666/tcp open  msrpc         Microsoft Windows RPC
49668/tcp open  msrpc         Microsoft Windows RPC
49674/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49675/tcp open  msrpc         Microsoft Windows RPC
49693/tcp open  msrpc         Microsoft Windows RPC
49708/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: RESOURCEDC; OS: Windows; CPE: cpe:/o:microsoft:windows

We enumerated users using nxc via smb and found a password in the description of V.Ventz user

And the credentials are working

We checked for the noPAC vulnerability & the server is vulnerable

Executed the exploit

We got domain administrator password hash

We used the password hash and got in as administrator

Got local.txt (0e678fee4b38e2485d99c46b4a7e2ef6)

Got proof.txt (348917c825b97f652a80875d09bf4a8d)


However there’s another way we can solve this

We use the v.ventz creds to enumerate shares

We login into the smbshare and see there’s backup of ntds and registry

Transferred all the file on local machine

We have ntds.dit and system so we can run secretsdump

Ran the secretsdump command and got all the hashes

Tried hashes and L.Livingstone user creds worked

Used the pass the hash attack and got in as L.Livingstone user

This user has GenericAll access to DC

We added a new computer named attackersystem

Used impacket-getST to impersonate administrator an get ticket for resourcedc

Added ticket to environment variable

We got nt on machine using pkexec