Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Pass the Hash Support #38

Open
IppSec opened this issue Apr 7, 2021 · 3 comments · May be fixed by #67
Open

[Feature Request] Pass the Hash Support #38

IppSec opened this issue Apr 7, 2021 · 3 comments · May be fixed by #67

Comments

@IppSec
Copy link

IppSec commented Apr 7, 2021

It would be nice to have the ability to spray user accounts with NTLM Hashes. The two main use cases I imagine for this is:

  • Pulling an NTLM Hash off a local workstation, then spraying AD to look for password re-use
  • Testing passwords from domain controller backups (old copies of NTDS.DIT).

Currently, this can be done with https://github.com/3gstudent/pyKerbrute, but is an extremely hacky solution using Python2.

@ropnop
Copy link
Owner

ropnop commented Apr 7, 2021

Good idea! This would require a bit of hack in gokrb5 but it can work. Basically instead of calling client.NewWithPassword, we'll call client.NewWithKeytab and manually create at temporary keytab with the NTLM hash as the encryption key. The "hack" will just be to change the library so it can accept a raw encryption key in RC4 instead of the expected plaintext password when calling AddEntry. Should have a workign branch in a few days - do you have a lab you could test in? My AD lab is down unfortunately I don't even have a working DC I can try kerbrute against at the moment

@P4cm4n90
Copy link

Any updates on this subject? I can help with testing.

@TryA9ain
Copy link

TryA9ain commented Mar 6, 2023

i can help too

@Utkar5hM Utkar5hM linked a pull request Oct 18, 2023 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants