80


We can try running responder and visiting our ip:
We get a hash back: 
We can crack this with hashcat:
We got california:
We can login with evil-winrm:
We find a todo.txt in desktop of enox: 
We can check for gmsa with powerview:

Now we can use GMSAPasswordReader.exe:
rc4_hmac hash is the same as the NT hash.
Now login using evil-winrm:
We have SeRestorePrivilege.
Now using this page: https://github.com/gtworek/Priv2Admin 
Now we can get to the lockscreen with rdesktop:
Now press win + U 
We have nt authority\system. 
Last updated
Was this helpful?