Kerberos
after AD users log in to the victim linux machine with AD credentials
cat /etc/krb5.conf #check realm
kvno ldap/[email protected] #case sensitive realm match krb5.conf
sudo echo "172.16.202.180 dc01.final.com final.com" >> /etc/hosts #for ldap connect
ldapsearch -Y GSSAPI -H ldap://dc01.corp1.com -D "[email protected]" -W -b "dc=corp1,dc=com" "servicePrincipalName=*" servicePrincipalNamekeytab
Ticket Usage after ticket in klist
Steal & Use Crendential Cache File (as root)
Use in Kali
Transfer the ccache
Setup
Usage
.kirbi to ccache
Last updated