80
Last updated
Last updated
We can try running responder and visiting our ip:
We can login with evil-winrm:
We can check for gmsa with powerview:
Now we can use GMSAPasswordReader.exe:
Now login using evil-winrm:
Now we can get to the lockscreen with rdesktop:
We get a hash back:
We can crack this with hashcat: We got california:
We find a todo.txt in desktop of enox:
rc4_hmac hash is the same as the NT hash.
We have SeRestorePrivilege.
Now using this page: https://github.com/gtworek/Priv2Admin
Now press win + U
We have nt authority\system.