Kerberos 5, etype 18, TGS-REP - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Kerberos 5, etype 18, TGS-REP (/thread-12219.html) |
Kerberos 5, etype 18, TGS-REP - zamgold - 11-15-2024 I have hash Kerberos 5, etype 18, TGS-REP in format like 13100: $krb5tgs$18$*...*$....$...... are there any ways to hack it? RE: Kerberos 5, etype 18, TGS-REP - DanielG - 11-15-2024 all you can do is try to guess the password using hashcat RE: Kerberos 5, etype 18, TGS-REP - zamgold - 11-15-2024 (11-15-2024, 02:22 PM)DanielG Wrote: all you can do is try to guess the password using hashcat How? RE: Kerberos 5, etype 18, TGS-REP - DanielG - 11-15-2024 The Wiki on https://hashcat.net/wiki/doku.php?id=hashcat has usage information. On the internet there are blogs related to this type of attack (kerberoasting) for example https://www.netwrix.com/cracking_kerberos_tgs_tickets_using_kerberoasting.html or on this forum https://hashcat.net/forum/thread-8531.html RE: Kerberos 5, etype 18, TGS-REP - zamgold - 11-15-2024 (11-15-2024, 03:44 PM)DanielG Wrote: The Wiki on https://hashcat.net/wiki/doku.php?id=hashcat has usage information. For my example $krb5tgs$18$*...*$....$...... - it's type of hash is not support by hashcat... RE: Kerberos 5, etype 18, TGS-REP - DanielG - 11-17-2024 On the example page on https://hashcat.net/wiki/doku.php?id=example_hashes you see type: 19700 Kerberos 5, etype 18, TGS-REP (AES256-CTS-HMAC-SHA1-96) $krb5tgs$18$user$realm$8efd91bb01cc69dd07e46009$7352410d6aafd72c64972a66058b02aa1c28ac580ba41137d5a170467f06f17faf5dfb3f95ecf4fad74821fdc7e63a3195573f45f962f86942cb24255e544ad8d05178d560f683a3f59ce94e82c8e724a3af0160be549b472dd83e6b80733ad349973885e9082617294c6cbbea92349671883eaf068d7f5dcfc0405d97fda27435082b82b24f3be27f06c19354bf32066933312c770424eb6143674756243c1bde78ee3294792dcc49008a1b54f32ec5d5695f899946d42a67ce2fb1c227cb1d2004c0 which looks like your hash and is supported, make sure everything is present in your hash |