Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Path: blob/master/documentation/modules/auxiliary/scanner/ntp/timeroast.md
Views: 16005
Vulnerable Application
Windows authenticates NTP requests by calculating the message digest using the NT hash followed by the first 48 bytes of the NTP message (all fields preceding the key ID). An attacker can abuse this to recover hashes that can be cracked offline for machine and trust accounts. The attacker must know the accounts RID, but because RIDs are sequential, they can easily be enumerated.
Verification Steps
Setup a Windows domain controller target
Start msfconsole
Use the
auxiliary/admin/dcerpc/samr_account
module to create a new computer account with theADD_COMPUTER
actionNote the RID (the last part of the SID) and password of the new account
Use the
auxiliary/scanner/ntp/timeroast
moduleSet the
RHOSTS
option to the target domain controllerSet the
RIDS
option to the RID of the new accountRun the module and see that a hash is collected, this has will show up in the output of the
creds
command if a database is connected
Options
RIDS
The RIDs to enumerate (e.g. 1000-2000). Multiple values and ranges can be specified using a comma as a separator.