Oct 21, 2023, 08:55 PM
i got DC01$::MANAGER:17ed3a8cf .. ntlm but i dont success to crack it
any hint on next step please?
any hint on next step please?
|
HTB - Manager [Discussion]
by webzi - Saturday October 21, 2023 at 06:09 PM
|
|
Oct 21, 2023, 08:55 PM
i got DC01$::MANAGER:17ed3a8cf .. ntlm but i dont success to crack it
any hint on next step please?
Oct 21, 2023, 08:58 PM
Oct 21, 2023, 09:01 PM
(Oct 21, 2023, 09:01 PM)D347H Wrote:(Oct 21, 2023, 08:58 PM)M4RCK Wrote:(Oct 21, 2023, 08:55 PM)D347H Wrote: i got DC01$::MANAGER:17ed3a8cf .. ntlm but i dont success to crack it I have already list of users but I can't get hashes and e.t.c (Oct 21, 2023, 09:01 PM)D347H Wrote:(Oct 21, 2023, 08:58 PM)M4RCK Wrote:(Oct 21, 2023, 08:55 PM)D347H Wrote: i got DC01$::MANAGER:17ed3a8cf .. ntlm but i dont success to crack it Check PM please
Oct 21, 2023, 09:03 PM
Quote:spray users But they don't have UF_DONT_REQUIRE_PREAUTH set.
Oct 22, 2023, 03:02 AM
its netntlmv2 not ntlm
Oct 22, 2023, 05:48 AM
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) [-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) [-] User DC01$ doesn't have UF_DONT_REQUIRE_PREAUTH set [-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) [-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) [-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) [-] User Zhong doesn't have UF_DONT_REQUIRE_PREAUTH set [-] User Cheng doesn't have UF_DONT_REQUIRE_PREAUTH set [-] User Ryan doesn't have UF_DONT_REQUIRE_PREAUTH set it shows this Could you give me some tips for what to do next. thank This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Hacked | Change your password or Contact us via https://breachforums.ai/contact if you feel this is incorrect or file appeal. (Oct 21, 2023, 09:50 PM)h3x44 Wrote:(Oct 21, 2023, 08:55 PM)D347H Wrote: i got DC01$::MANAGER:17ed3a8cf .. ntlm but i dont success to crack it mssql password reuse for one of the users xp_dirtree for the hash that hash doesn't really get you anywhere after you use the info above and get mssql session check the www directory, youll have enough info for user
User:
1. Use Crackmapexec to get a list of users via RID bruteforcing crackmapexec smb manager.htb -u 'anonymous' -p '' --rid-brute2. You should have the following users:
The "Operator" account looks interesting. Try to guess the password. Hint: #!/usr/bin/python33. "Operator" can login to the MSSQL server. Use this syntax: impacket-mssqlclient -p 1433 -windows-auth -dc-ip 10.10.11.236 "manager.htb/Operator:<password>"@10.10.11.2364. There is a special stored procedure that lets you traverse the filesystem via MSSQL. Use that to explore an attack surface you thought wasn't exploitable. 5. Download that interesting archive and see where it takes you
|
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS 12 FLAGS | 66 | 1,772 |
2 hours ago Last Post: vlka |
||
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 370 | 92,495 |
7 hours ago Last Post: lifolifo007 |
||
| Hack the box Pro Labs, VIP, VIP+ 1 month free Method | 23 | 2,207 |
10 hours ago Last Post: kkkato |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 20 | 2,521 |
Apr 29, 2026, 11:06 PM Last Post: op334 |
||
|
|
[FREE] HackTheBox All Cheatsheets | 3 | 414 |
Apr 29, 2026, 10:36 PM Last Post: op334 |
|