đ©
THM Walkthroughs
Search...
Ctrl
K
Difficulty: Medium
Attacktive Directory
Task 5 - Abusing Kerberos
Previous
Task 4 - Enumerating Users via Kerberos
Next
Task 6 - Back to the Basics
Last updated
2 years ago
Task 5
Exploitation
Abusing Kerberos
We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?
Reveal Flag
svc-admin
Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)
Reveal Flag
Kerberos 5 AS-REP etype 23
What mode is the hash?
Reveal Flag
18200
Now crack the hash with the modified password list provided, what is the user accounts password?
Reveal Flag
management2005
đš
đȘ
đ©
đ©
đ©
đ©
đ©
đ©
đ©
đ©