Skip to content

Commit

Permalink
Update 4-ad-attacks.md
Browse files Browse the repository at this point in the history
  • Loading branch information
syselement committed Jan 14, 2025
1 parent aaae3f1 commit 55c1539
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions peh/4-active-directory/4-ad-attacks.md
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ hashcat -m 1000 ntlm.txt /usr/share/wordlists/rockyou.txt

## Kerberoasting

**Kerberoasting** is a post-exploitation attack technique that attempts to obtain a password hash of an Active Directory account that has a **SPN** (Service Principal Name), focusing on the acquisition of **TGS** (Ticket Granting Server) tickets issued by the KDC (Key Distribution Center).
**Kerberoasting** is a post-exploitation attack technique that attempts to obtain a password hash of an Active Directory account that has a **SPN** (Service Principal Name), focusing on the acquisition of **TGS** (Ticket Granting Server) tickets issued by the **KDC** (Key Distribution Center).

### GetUserSPNs.py

Expand Down Expand Up @@ -165,7 +165,7 @@ Tokens are temporary keys that provide access to a system or network without nee
- **Delegate** - created for logging into machine or Remote Desktop
- **Impersonate** - non-interactive

Turn on `THEPUNISHER` (`192.168.31.93`) and `HYDRA-DC` (`192.168.31.90`) VMs, and login to `THEPUNISHER`.
📌 Turn on `THEPUNISHER` (`192.168.31.93`) and `HYDRA-DC` (`192.168.31.90`) VMs, and login to `THEPUNISHER`.

```bash
msfconsole
Expand Down

0 comments on commit 55c1539

Please sign in to comment.