Hey, any idea why targetedKerberoast gives me a different hash every time I run it against the Michael user?
Turns out his password is getting changed. You have to change it instead of cracking it in order to progress
See what michael can do, and though him which user can be compromised. Also look for common protocol. Rest is easy
Thanks!
Good day everyone!
looks like iām unable to DCSyncā¦ trying to do this via PSRemote. I always get āERROR kuhl_m_lsadump_dcsync ; GetNCChanges: 0x000020f7 (8439)āā¦ so Iām not allowed?? Iām trying as user michaelā¦
any hints here? Iām missing sometging here iām sure
thanks alot
Thats the only response I ever got so I stopped trying that method. I moved on to another user that michael is connected to.
Go check out bloodhound and see what different users can do.
I didnāt look further into the backup-file I foundā¦ that was the right pathā¦thanks anyways
Hi,
Pwned, if you need a tip feel free to DM
PWNED!!
Comparatively easy than other medium difficulty machines
If anyone need help, then DM
Kerberos is also very time-dependent, so itās possible the results you get change because the current time is different each time you fetch the hash.
Can i please get a hint in how to move laterally from user B. to user E. ? I actually know how to compromise the whole Domain (Thanks to BloodHound). But canāt find a way to own or pwn that user E.
This helped me, Thanks @MEGAZORDII
hmmā¦ did not work ntpdate
āāā(kalićækali)-[~/lab/Administrator]
āā$ date
Sat Nov 16 12:52:49 PM JST 2024
āāā(kalićækali)-[~/lab/Administrator]
āā$ sudo ntpdate -b 10.10.11.42
2024-11-16 19:39:42.483551 (+0900) +24410.345334 +/- 0.088977 10.10.11.42 s1 no-leap
CLOCK: time stepped by 24410.345334
āāā(kalićækali)-[~/lab/Administrator]
āā$ date
Sat Nov 16 12:52:55 PM JST 2024
https://www.virtualbox.org/manual/UserManual.html#fine-tune-timers
I tried it, so clock issue was fix.
But can not kerberoastingā¦
Thank you so much!!! Iāve been searching for this very thing. This is going to help me with another box I was working on. Thank you again!!!
I stacked itā¦
Help meā¦
I did
- bloodhound
- Some users owned
- Crack pass with hashcat
- Attempted to connect, but could notā¦(smb/winrm/ldap)
One of the users has access to the FTPā¦ you might find something in thereā¦
Thanks! I got it, and cracked it!
But can not use passā¦