80

We can try running responder and visiting our ip:

We get a hash back:

We can crack this with hashcat: We got california:

We can login with evil-winrm:

We find a todo.txt in desktop of enox:

We can check for gmsa with powerview:

Now we can use GMSAPasswordReader.exe:

rc4_hmac hash is the same as the NT hash.

Now login using evil-winrm:

We have SeRestorePrivilege.

Now using this page: https://github.com/gtworek/Priv2Admin

Now we can get to the lockscreen with rdesktop:

Now press win + U

We have nt authority\system.

Last updated

Was this helpful?