Naming Convention
A potential naming convention that the target organization uses was initially suspected while attempting to enumerate valid domain users by performing a brute-force attack against the target KDC.
At a later stage, a valid domain user, suspected to be an admin user, has been disclosed in the supportrequest.html file during the Web enumeration. Observation to the username structure suggests that it follows and matches the very same naming convention, discovered during the Kerberos enumeration earlier.
The discovered naming convention is the first letter of firstname, followed by lastname
In the following sections, A list of potential usernames will be generated, following the discovered naming convention of the target organization
Wordlist
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ python3 ~/Tools/username_generator.py
Choose username format:
1) hsimpson
2) h.simpson
3) homersimpson
4) homer.simpson
5) hjsimpson
6) homerjsimpson
7) homerjaysimpson
8) homersimpsonb
Option: 1
Mail domain (example: ...@domain.com) [Default: none]: 
Domain (example: domain\...) [Default: none]: 
Surnames file path: /usr/share/wordlists/seclists/Usernames/Names/familynames-usa-top1000.txt
Output file [Default: results.txt]: /home/kali/archive/htb/labs/scrambled/list.txt
Output saved in /home/kali/archive/htb/labs/scrambled/list.txtUsername generation complete
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ wc -l list.txt                                                             
26000 list.txtThe generated list contains 26,000 potential usernames
Username Extraction
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ kerbrute userenum --dc dc1.scrm.local -d SCRM.LOCAL ./list.txt
 
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
 
version: v1.0.3 (9dad6e1) - 11/17/23 - Ronnie Flathers @ropnop
 
2023/11/17 21:51:37 >  Using KDC(s):
2023/11/17 21:51:37 >  	dc1.scrm.local:88
 
2023/11/17 21:51:37 >  [+] VALID USERNAME:	 aSMITH@SCRM.LOCAL
2023/11/17 21:51:53 >  [+] VALID USERNAME:	 jHALL@SCRM.LOCAL
2023/11/17 21:52:31 >  [+] VALID USERNAME:	 sJENKINS@SCRM.LOCAL
2023/11/17 21:53:00 >  [+] VALID USERNAME:	 kSIMPSON@SCRM.LOCAL
2023/11/17 21:53:03 >  [+] VALID USERNAME:	 kHICKS@SCRM.LOCAL
2023/11/17 22:02:49 >  Done! Tested 26000 usernames (5 valid) in 671.318 secondsWhile performing a brute-force attack against the target KDC server confirms the presence of the ksimpson user, alongside the 3 already-discovered users, it also finds a single additional domain user; khicks
All these usernames will be saved into a file