From the course: Complete Guide to Penetration Testing
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Carry out a Kerberos roasting
From the course: Complete Guide to Penetration Testing
Carry out a Kerberos roasting
- [Instructor] One of the account options in Active Directory does not require Kerberos pre-authentication. If this is set, we can use the Impacket exploit GetNPUsers to extract the authentication details. We can run this even without domain access. We've got Impacket installed already, so let's run this against our Active Directory server and see if anyone has this attribute set, cd /usr/share/doc/python3-impacket/examplesm and we'll run python3 GetNPUsers.py and our domain is cybex. dc-ip is 192.168.1.199. Our usersfile, I've set up in my home directory in a file called unames, and we'll produce a file in hashcat format minus format hashcat. And we very quickly get nstove07's password hash returned. I've already stored that in a file called nhash, so let's run that through John the Ripper. I go back to my home directory and john nhash minus minus wordlist equals /usr/share/wordlists/rockyou.txt. And we very quickly get nstove07's password of password01.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Understand Active Directory's role in security4m 36s
-
(Locked)
What are Active Directory Domain Services?5m 45s
-
(Locked)
Interact with Active Directory at the command line2m 4s
-
(Locked)
Active Directory security audit1m 40s
-
(Locked)
Password spraying Active Directory2m 30s
-
(Locked)
Use CrackMapExec to access and enumerate AD2m 41s
-
(Locked)
Set the BloodHound loose6m 34s
-
(Locked)
What is Kerberos?2m 4s
-
(Locked)
Kerberos brute forcing attacks2m 56s
-
(Locked)
Carry out a Kerberos roasting2m
-
(Locked)
-
-
-
-
-