Attacking Service Accounts
Last updated
Last updated
For more on service accounts and enumeration go here:
It's not uncommon to see service accounts that utilize GMSA to handle credentials.
We can use GMSADumper from our kali box to dump hashes. Depending on the user we're running from we'll receive a full NTLMv2 hash or a NT Hash.
From there we can go along to either crack the NTLMv2 hash or try to perform a Pass-The-Ticket (PTT) attack.
NOTE: rc4_hmac is the same as the ntlm hash.
DONT FORGET THE $ IN THE USERNAME! ANYTIME YOU SEE THIS YOU MUST ADD IT!
If we have access to a service account with READ privilege for GMSA we can use to view the password of the GMSA managed service account