Task 5 - Abusing Kerberos

Task 5 Exploitation Abusing Kerberos

We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?

Reveal Flag ๐Ÿšฉ

๐Ÿšฉsvc-admin

Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)

Reveal Flag ๐Ÿšฉ

๐ŸšฉKerberos 5 AS-REP etype 23

What mode is the hash?

Reveal Flag ๐Ÿšฉ

๐Ÿšฉ18200

Now crack the hash with the modified password list provided, what is the user accounts password?

Reveal Flag ๐Ÿšฉ

๐Ÿšฉmanagement2005

Last updated