Kerberos
Nmap has also enumerated that the target system is running the Kerberos service on port 88
and 464
Kerbrute User Enumeration
┌──(kali㉿kali)-[~/archive/htb/labs/mantis]
└─$ kerbrute userenum -d htb.local --dc mantis.htb.local /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: v1.0.3 (9dad6e1) - 01/10/23 - Ronnie Flathers @ropnop
2023/01/10 15:03:20 > Using KDC(s):
2023/01/10 15:03:20 > mantis.htb.local:88
2023/01/10 15:03:25 > [+] VALID USERNAME: james@htb.local
2023/01/10 15:03:26 > [+] VALID USERNAME: James@htb.local
2023/01/10 15:03:30 > [+] VALID USERNAME: administrator@htb.local
2023/01/10 15:03:36 > [+] VALID USERNAME: mantis@htb.local
2023/01/10 15:03:46 > [+] VALID USERNAME: JAMES@htb.local
2023/01/10 15:04:08 > [+] VALID USERNAME: Administrator@htb.local
2023/01/10 15:04:27 > [+] VALID USERNAME: Mantis@htb.local
2023/01/10 15:32:38 > [+] VALID USERNAME: MANTIS@htb.local
For now, I don’t know the naming scheme if there is any, but I tried brute-forcing against the target Kerberos for domain usernames with kerbrute
.
kerbrute
found a total of 3 valid domain users:
james
administrator
mantis
I had this running for half an hour as the wordlist is very long.