
Sign up to save your podcasts
Or


Hi! This episode of pentest pwnage is a fun one because it was built for speeeeeeeeeeeeeeeed. Here's some of the things we're doing/running when time is of the essence:
Then get some important info in PowerView:
Get-DomainUser -PreAuthNotRequired - find AD users with this flag set...then crack the hash for a (potentially) easy win!
Get-NetUser -spn - find Kerberoastable accounts...then crack the hash for a (potentially) easy win!
Find-LocalAdminAccess -Verbose helps you find where your general AD user has local admin access!
Once you know where you have local admin access, lsassy is your friend:
Did you get an admin's NTLM hash from this dump? Then do this:
(Pwn3d!) FTW!
By Brian Johnson4.7
6868 ratings
Hi! This episode of pentest pwnage is a fun one because it was built for speeeeeeeeeeeeeeeed. Here's some of the things we're doing/running when time is of the essence:
Then get some important info in PowerView:
Get-DomainUser -PreAuthNotRequired - find AD users with this flag set...then crack the hash for a (potentially) easy win!
Get-NetUser -spn - find Kerberoastable accounts...then crack the hash for a (potentially) easy win!
Find-LocalAdminAccess -Verbose helps you find where your general AD user has local admin access!
Once you know where you have local admin access, lsassy is your friend:
Did you get an admin's NTLM hash from this dump? Then do this:
(Pwn3d!) FTW!

186 Listeners

2,006 Listeners

372 Listeners

372 Listeners

652 Listeners

1,025 Listeners

319 Listeners

418 Listeners

8,073 Listeners

176 Listeners

315 Listeners

187 Listeners

73 Listeners

140 Listeners

44 Listeners