GenericWrite on User (Hugo -> Ramon)

  • As we just set up Hugo.Chavez's password we will now exploit the GenericWrite from hugo.Chavez to Ramon.Maldonado

  • This could be abuse with 3 different ways :

    • shadowCredentials (windows server 2016 or +)

    • targetKerberoasting (password should be weak enough to be cracked)

    • logonScript (this need a user connection and to be honest it never worked or unless with a script already inside sysvol)

Target Kerberoasting

Install TargetedKerberoast.py

Get The Hash

Crack Hash with RockYou.txt

Last updated