Kerberos attack module

Hi all,

I am trying to do the assessment skills, but i am stuck on how to enumerate unconstrained delegation. i cracked the password of the d*** user using john the ripper, but… no lucky so far

any hints for cracking the assessment?

btw let me know if anyone was able to crack the pass with hashcat, it didnt work for me

Completely stuck on the same question and in general on how to decently enumerate AD from lilnux even with an account with creds

ok, found the correct machine with lookupsid.py but mainly because there is only one machine besides the DC.

1 Like

I found the user and his/hers password that can authenticate to server with unconstrained delegation as administrator. I am stuck on last question.

Now because I am on parrot VM Im not sure how to connect to that server to start monitoring tickets with Rubeus.

My guess is that I need to connect to that server as found user & password and start monitoring tickets until a Domain Admin logs in , but I am not sure how as I only know how to do that on windows.

How did you crack the password? I cannot seem to crack it, tried John and hashcat with rockyou.txt

Got it! for other use GetNPUsers.py not kerbrute, you need a $krb5asrep$23 hash to crack it.

1 Like