Task 5 - Abusing Kerberos

Task 5 Exploitation Abusing Kerberos

We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?

Reveal Flag đŸš©

đŸš©svc-admin

Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)

Reveal Flag đŸš©

đŸš©Kerberos 5 AS-REP etype 23

What mode is the hash?

Reveal Flag đŸš©

đŸš©18200

Now crack the hash with the modified password list provided, what is the user accounts password?

Reveal Flag đŸš©

đŸš©management2005

Last updated