⚔️4 - Enumeration without Users

Enumerate anonymously

## 192.168.56.10-12-22-23 ## NOTHING FOUND!
------------------------------------------
nxc smb 192.168.56.11 --users
SMB         192.168.56.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         192.168.56.11   445    WINTERFELL       -Username-                    -Last PW Set-       -BadPW- -Description-
SMB         192.168.56.11   445    WINTERFELL       Guest                         <never>             0       Built-in account for guest access to the computer/domain
SMB         192.168.56.11   445    WINTERFELL       arya.stark                    2024-03-21 12:06:52 0       Arya Stark
SMB         192.168.56.11   445    WINTERFELL       sansa.stark                   2024-03-21 12:07:03 0       Sansa Stark
SMB         192.168.56.11   445    WINTERFELL       brandon.stark                 2024-03-21 12:07:05 0       Brandon Stark
SMB         192.168.56.11   445    WINTERFELL       rickon.stark                  2024-03-21 12:07:08 0       Rickon Stark
SMB         192.168.56.11   445    WINTERFELL       hodor                         2024-03-21 12:07:10 0       Brainless Giant
SMB         192.168.56.11   445    WINTERFELL       jon.snow                      2024-03-21 12:07:13 0       Jon Snow
SMB         192.168.56.11   445    WINTERFELL       jeor.mormont                  2024-03-21 12:07:17 0       Jeor Mormont
SMB         192.168.56.11   445    WINTERFELL       sql_svc                       2024-03-21 12:07:20 0       sql service
SMB         192.168.56.11   445    WINTERFELL       [*] Enumerated 9 local users: NORTH

OKAY! This is the until IP with null sessions in smb and we can enumerate his users

Password Policy

We can see with the flag --pass-pol the password policy and do a idea of the restrictions -->

nxc smb 192.168.56.11 --pass-pol
SMB         192.168.56.11   445    WINTERFELL       [*] Windows 10 / Server 2019 Build 17763 x64 (name:WINTERFELL) (domain:north.sevenkingdoms.local) (signing:True) (SMBv1:False)
SMB         192.168.56.11   445    WINTERFELL       [+] Dumping password info for domain: NORTH
SMB         192.168.56.11   445    WINTERFELL       Minimum password length: 5
SMB         192.168.56.11   445    WINTERFELL       Password history length: 24
SMB         192.168.56.11   445    WINTERFELL       Maximum password age: 311 days 2 minutes 
SMB         192.168.56.11   445    WINTERFELL       
SMB         192.168.56.11   445    WINTERFELL       Password Complexity Flags: 000000
SMB         192.168.56.11   445    WINTERFELL           Domain Refuse Password Change: 0
SMB         192.168.56.11   445    WINTERFELL           Domain Password Store Cleartext: 0
SMB         192.168.56.11   445    WINTERFELL           Domain Password Lockout Admins: 0
SMB         192.168.56.11   445    WINTERFELL           Domain Password No Clear Change: 0
SMB         192.168.56.11   445    WINTERFELL           Domain Password No Anon Change: 0
SMB         192.168.56.11   445    WINTERFELL           Domain Password Complex: 0
SMB         192.168.56.11   445    WINTERFELL       
SMB         192.168.56.11   445    WINTERFELL       Minimum password age: 1 day 4 minutes 
SMB         192.168.56.11   445    WINTERFELL       Reset Account Lockout Counter: 5 minutes 
SMB         192.168.56.11   445    WINTERFELL       Locked Account Duration: 5 minutes 
SMB         192.168.56.11   445    WINTERFELL       Account Lockout Threshold: 5
SMB         192.168.56.11   445    WINTERFELL       Forced Log off Time: Not Set

It show us that if we fail 5 consecutives times (Minimum password length: 5), in 5 minutes (Reset Account Lockout Counter: 5 minutes), we will lock the accounts of that users for 5 minutes (Account Lockout Threshold: 5)


With enum4linux

With it, we can confirm the anonymous listing of the part of NORTH DC

enum4linux 192.168.56.11

User list and password policy (same nxc)

enum4linux can also lit the full domain user listing members of domain group

With rpc call (rpcclient)

rpcclient -U "" -N 192.168.56.11

The anonymous listing is available withe Remote Procedure Call -->

srvsvccli> enumdomusers       # Enumerar usuarios del dominio
srvsvccli> enumdomgroups      # Enumerar grupos del dominio
srvsvccli> querydominfo       # Información del dominio
srvsvccli> enumalsgroups      # Enumerar grupos locales
srvsvccli> netshareenumall    # Listar recursos compartidos (shares)
srvsvccli> lookupnames        # Resolver nombres

With its, we can use net rpc to get all domain users:

net rpc group members 'Domain Users' -W 'NORTH' -I '192.168.56.11' -U '%'

Enumeration anonymously (when anonymous sessions are not allowed & users list)

With the above users enumeration, we can see a lot of users name, this i would saving into a .txt. Insert in it, all users name you should be exists.

Kerberos Enumeration

We can see with the previus nmap scan the hosts with the port 88 (kerberos) up or, we can search again its -->

nmap -p 88 --open --max-rate 500 -n -Pn 192.168.56.10 192.168.56.11 192.168.56.12 192.168.56.22 192.168.56.23
#################################################
Nmap scan report for 192.168.56.10
PORT   STATE SERVICE
88/tcp open  kerberos-sec

Nmap scan report for 192.168.56.11
PORT   STATE SERVICE
88/tcp open  kerberos-sec

Nmap scan report for 192.168.56.12
PORT   STATE SERVICE
88/tcp open  kerberos-sec

And with that we can send the user list that we have and existing users -->

192.168.56.10

nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='sevenkingdoms.local',userdb=usersList.txt" 192.168.56.10
#######################################################
Nmap scan report for sevenkingdoms.local (192.168.56.10)
PORT   STATE SERVICE
88/tcp open  kerberos-sec
| krb5-enum-users: 
| Discovered Kerberos principals
|     tywin.lannister@sevenkingdoms.local
|     robert.baratheon@sevenkingdoms.local
|     cersei.lannister@sevenkingdoms.local
|     joffrey.baratheon@sevenkingdoms.local
|     renly.baratheon@sevenkingdoms.local
|     stannis.baratheon@sevenkingdoms.local
|_    jaime.lannister@sevenkingdoms.local

Remenber, for the nexts ips, change the <domain name> in nmap command: krb5-enum-users.realm='domain'

192.168.56.11

nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='north.sevenkingdoms.local',userdb=usersList.txt" 192.168.56.11
#######################################################
PORT   STATE SERVICE
88/tcp open  kerberos-sec
| krb5-enum-users: 
| Discovered Kerberos principals
|     hodor@north.sevenkingdoms.local
|     robb.stark@north.sevenkingdoms.local
|     samwell.tarly@north.sevenkingdoms.local
|     arya.stark@north.sevenkingdoms.local
|     catelyn.stark@north.sevenkingdoms.local
|     jon.snow@north.sevenkingdoms.local
|     sansa.stark@north.sevenkingdoms.local
|     jeor.mormont@north.sevenkingdoms.local
|_    rickon.stark@north.sevenkingdoms.local

192.168.56.12

nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='essos.local',userdb=usersList.txt" 192.168.56.12 
#######################################################
PORT   STATE SERVICE
88/tcp open  kerberos-sec
| krb5-enum-users: 
| Discovered Kerberos principals
|     jorah.mormont@essos.local
|     daenerys.targaryen@essos.local
|     khal.drogo@essos.local
|     viserys.targaryen@essos.local
|_    missandei@essos.local

Last updated