Task 5 Exploitation Abusing Kerberos
We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?
Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)
Reveal Flag
Kerberos 5 AS-REP etype 23
Now crack the hash with the modified password list provided, what is the user accounts password?