Skip to content

Conversation

@0Nightsedge0
Copy link

Issues

  • Brute Command encryption type is hard-coded aes256_cts_hmac_sha1, sometimes old systems are not supported.
  • The hash spray function should be useful.

Solution: Command Amended

Brute

  • Added support for hash spraying via the </hash:hash_value> option.
  • Enforced explicit encryption type selection for password or hash spraying; encryption type is no longer hard-coded.
    • Current Supported encryption types: /(rc4|aes128|aes256|des_cbc_md5|des3_cbc_md5|des3_cbc_sha1)
  • Reuse the Ask.TGT function to request a ticket for improving error handling directly
  • Introduced the ReportInvalidPassword function to provide clearer messages for invalid passwords.

initial version
- Option: `/hash:hash_value & /(rc4|aes128|aes256|des_cbc_md5|des3_cbc_md5|des3_cbc_sha1)`
- Assumed `KDC_ERR_PREAUTH_FAILED` = incorrect password, Assumed all usernames are correct and pre-auth enabled.
- add ReportInvalidPassword function to reporting wrong password
- change default enctype from `aes256_cts_hmac_sha1` to `rc4_hmac`
Reuse ASK.TGT function
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant