Skip to content

Latest commit

 

History

History
45 lines (23 loc) · 1.2 KB

File metadata and controls

45 lines (23 loc) · 1.2 KB

Task 5 - Abusing Kerberos

Task 5 Exploitation Abusing Kerberos

We have two user accounts that we could potentially query a ticket from. Which user account can you query a ticket from with no password?

Reveal Flag 🚩

🚩svc-admin

Looking at the Hashcat Examples Wiki page, what type of Kerberos hash did we retrieve from the KDC? (Specify the full name)

Reveal Flag 🚩

🚩Kerberos 5 AS-REP etype 23

What mode is the hash?

Reveal Flag 🚩

🚩18200

Now crack the hash with the modified password list provided, what is the user accounts password?

Reveal Flag 🚩

🚩management2005