Learning Objective - 14

Listamos los servicios en el AD.

PS C:\AD\Tools\ADModule-master\ActiveDirectory> Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName


DistinguishedName    : CN=krbtgt,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local
Enabled              : False
GivenName            :
Name                 : krbtgt
ObjectClass          : user
ObjectGUID           : 956ae091-be8d-49da-966b-0daa8d291bb2
SamAccountName       : krbtgt
ServicePrincipalName : {kadmin/changepw}
SID                  : S-1-5-21-719815819-3726368948-3917688648-502
Surname              :
UserPrincipalName    :

DistinguishedName    : CN=web svc,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local
Enabled              : True
GivenName            : web
Name                 : web svc
ObjectClass          : user
ObjectGUID           : b7ab147c-f929-4ad2-82c9-7e1b656492fe
SamAccountName       : websvc
ServicePrincipalName : {SNMP/ufc-adminsrv.dollarcorp.moneycorp.LOCAL, SNMP/ufc-adminsrv}
SID                  : S-1-5-21-719815819-3726368948-3917688648-1114
Surname              : svc
UserPrincipalName    : websvc

DistinguishedName    : CN=svc admin,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local
Enabled              : True
GivenName            : svc
Name                 : svc admin
ObjectClass          : user
ObjectGUID           : 244f9c84-7e33-4ed6-aca1-3328d0802db0
SamAccountName       : svcadmin
ServicePrincipalName : {MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local:1433,
                       MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local}
SID                  : S-1-5-21-719815819-3726368948-3917688648-1118
Surname              : admin
UserPrincipalName    : svcadmin



PS C:\AD\Tools\ADModule-master\ActiveDirectory>

Obtenemos la info

o tambien

NO OLVIDEMOS ENTRAR AL ARCHIVO hash.txt y eliminar el puerto del servicio SQL antes de crackear.

Last updated