arrow-up-right
In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!
Use extra-scripts/timecrack.py from SecuraBV Timeroast tool
extra-scripts/timecrack.py
Timeroast
Or: Hashcat will add support for Timeroast hashesarrow-up-right as hash type 31300. Currently, it's already available in the beta releasearrow-up-right.
Last updated 4 months ago
nxc smb IP -M timeroast