Active Directory Enumeration & Attacks: LLMNR/NBT-NS Poisoning - from Windows

Hello, in the section LLMNR/NBT-NS Poisoning - from Windows you’re required to RDP to the target machine and execute Inveigh. But when I try to RDP to the target machine with the credentials htb-student:Academy_student_AD!, it says that the password is wrong. I’ve tried to log in about 10 times now and I’m certain I’ve typed both the username and the password exactly right and I’ve restarted both the Pwnbox and the target machine multiple times.

Anyone else run into this? I’m not sure what to do here.

Edit: exact same issue in section Internal Password Spraying - from Windows

xfreerdp /u:htb-student /p:Academy_student_AD! /v:ip /cert-ignore /bpp:8 /network:modem /compression -themes -wallpaper /clipboard /audio-mode:1 /auto-reconnect -glyph-cache /dynamic-resolution

2 Likes

Use quotation marks… Bash interpret special characters differently

Thanks man you saved my life.

I just want to say THANK YOU VERY MUCH!