Path: blob/master/documentation/modules/auxiliary/scanner/ntp/timeroast.md
33166 views
Vulnerable Application
Windows authenticates NTP requests by calculating the message digest using the NT hash followed by the first 48 bytes of the NTP message (all fields preceding the key ID). An attacker can abuse this to recover hashes that can be cracked offline for machine and trust accounts. The attacker must know the accounts RID, but because RIDs are sequential, they can easily be enumerated.
Verification Steps
Setup a Windows domain controller target
Start msfconsole
Use the
auxiliary/admin/dcerpc/samr_accountmodule to create a new computer account with theADD_COMPUTERactionNote the RID (the last part of the SID) and password of the new account
Use the
auxiliary/scanner/ntp/timeroastmoduleSet the
RHOSTSoption to the target domain controllerSet the
RIDSoption to the RID of the new accountRun the module and see that a hash is collected, this has will show up in the output of the
credscommand if a database is connected
Options
RIDS
The RIDs to enumerate (e.g. 1000-2000). Multiple values and ranges can be specified using a comma as a separator.