Timeroasting
Some computer accounts can be configured with legacy passwords that are the first 14 characters (lowercase) of their username (minus the $). You can attack this in one of three ways:
Password spraying
Kerberoasting
Timeroasting (preferred)
Timeroasting abuses the Window NTP protocol (sntp-ms), which extends the NTP protocol by adding a Message Authentication Code (MAC). This attack requests NTP syncs for a given RID and get's a hash back that can be cracked to the machine account password.
If you are not authenticated, you will not know the RIDs... but you can just bruit force the RIDs. You will then need to map the RIDs to hostnames, but you can also just attempt every hostname against every RID's sntp-ms hash.
Download tooling
Get list of Timeroasting password candidates
Authenticated (Perfered)
Coming soon... some LDAP query should be able to get all the machine accounts names, but I haven't tested this yet.
Unauthenticated
Get list of hostnames - Reverse DNS
You will have to do some manual parsing of the Timeroasting password candidates file since there could be some default PTR addresses that are not actually hostnames. If you don't, the cracking could be quite a bit slower but it should still be doable
Collect Timeroasting hashes
Timeroast via RID Bruit Force - Netexec (Preferred)
Timeroast via RID Bruit Force - timeroast.py
Crack Timeroasting hashes
Last updated