Kerberos - Authentication
Last updated
Last updated
You have been asked by Cat Corporation’s SOC team to retrieve a user’s password linked to a suspicious Kerberos connection.
Flag format :
RM{user@DomainName:password}
And the corresponding zip file:
As we open the archive, we can see we're dealing with a pcapng file. This means we will be using Wireshark and looking at the information we received, we're going to search for a Kerberos connection.
After filtering we end up with 7 frames.
Looking at the first one, we already find something really interesting. Namely, a user: william.dupond and a domain name: CATCORP.LOCAL.
Now we only have the password left to find !
If you're not familiar with Kerberos and AR-REQ Roasting, I recommend reading some more about it. But basically if you use Kerberos, you will send an AS-REQ to the authentication service. This message includes sensitive data, with segments encrypted using the user's password hash.
Knowing this, when we look at the AS-REQ frame, we can indeed find a very interesting hash.
We can now try to crack this hash using JohnTheRipper or HashCat.
Note: Kerberos uses a specific format so make sure your hash looks like this before attempting to crack it.
So that means our flag is: RM{william.dupond@CATCORP.LOCAL:kittycat12}
Alternatively, we could also have used (a network forensics tool). You just open the pcap file with it, then check the "Credentials" tab and it's the first entry.