🎫
Active
  • Active
    • Summary
  • Enumeration
    • TCP
    • Web Services
      • Nikto
      • Dirb Extensions
      • Dirsearch
      • goBuster
      • Robots
      • WhatWeb
    • Other Services
      • DNS
      • Kerberos
      • MSRPC
      • SMB
      • LDAP
  • Exploitation
Powered by GitBook
On this page

Exploitation

PreviousLDAP

Last updated 1 month ago

Using the credentials I was able to get the TGS for the Administrator user with GetUserSPNs and was able to kerberoast successfully.

Using the following command I was able to crack the TGS.

hashcat -m 13100 -a 0 user.txt /usr/share/wordlists/rockyou.txt --force

The password for the Administrator account was Ticketmaster1968.