Hello,
Has anyone solved the optional task in this module?
I tried evil-winrm, xfreerdp with /pth: and cracking the hash with hashcat using couple of the wordlists from the seclist. Any suggestions?
Much obliged
bf
Hello,
Has anyone solved the optional task in this module?
I tried evil-winrm, xfreerdp with /pth: and cracking the hash with hashcat using couple of the wordlists from the seclist. Any suggestions?
Much obliged
bf
Hello. Did you solve this optional exercise or anyone else? I would really appreciate some help with it as I don’t see how can I pth without higher privs like local admin account or SeDebug.