Skip to content

Commit 34be81d

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 57c6904 commit 34be81d

File tree

1 file changed

+50
-40
lines changed

1 file changed

+50
-40
lines changed

db/modules_metadata_base.json

Lines changed: 50 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -18645,7 +18645,7 @@
1864518645
"autofilter_ports": [],
1864618646
"autofilter_services": [],
1864718647
"targets": null,
18648-
"mod_time": "2024-07-23 09:56:40 +0000",
18648+
"mod_time": "2025-05-13 11:21:04 +0000",
1864918649
"path": "/modules/auxiliary/gather/asrep.rb",
1865018650
"is_install_path": true,
1865118651
"ref_name": "gather/asrep",
@@ -20557,45 +20557,6 @@
2055720557
"needs_cleanup": false,
2055820558
"actions": []
2055920559
},
20560-
"auxiliary_gather/get_user_spns": {
20561-
"name": "Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)",
20562-
"fullname": "auxiliary/gather/get_user_spns",
20563-
"aliases": [],
20564-
"rank": 300,
20565-
"disclosure_date": "2014-09-27",
20566-
"type": "auxiliary",
20567-
"author": [
20568-
"Alberto Solino",
20569-
"Jacob Robles"
20570-
],
20571-
"description": "This module will try to find Service Principal Names that are associated with normal user accounts.\n Since normal accounts' passwords tend to be shorter than machine accounts, and knowing that a TGS request\n will encrypt the ticket with the account the SPN is running under, this could be used for an offline\n bruteforcing attack of the SPNs account NTLM hash if we can gather valid TGS for those SPNs.\n This is part of the kerberoast attack research by Tim Medin (@timmedin).",
20572-
"references": [
20573-
"URL-https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py",
20574-
"URL-https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf"
20575-
],
20576-
"platform": "",
20577-
"arch": "",
20578-
"rport": null,
20579-
"autofilter_ports": [],
20580-
"autofilter_services": [],
20581-
"targets": null,
20582-
"mod_time": "2023-01-17 18:59:12 +0000",
20583-
"path": "/modules/auxiliary/gather/get_user_spns.py",
20584-
"is_install_path": true,
20585-
"ref_name": "gather/get_user_spns",
20586-
"check": false,
20587-
"post_auth": true,
20588-
"default_credential": false,
20589-
"notes": {
20590-
"AKA": [
20591-
"GetUserSPNs.py",
20592-
"Kerberoast"
20593-
]
20594-
},
20595-
"session_types": false,
20596-
"needs_cleanup": false,
20597-
"actions": []
20598-
},
2059920560
"auxiliary_gather/gitlab_authenticated_subgroups_file_read": {
2060020561
"name": "GitLab Authenticated File Read",
2060120562
"fullname": "auxiliary/gather/gitlab_authenticated_subgroups_file_read",
@@ -21855,6 +21816,55 @@
2185521816
"needs_cleanup": false,
2185621817
"actions": []
2185721818
},
21819+
"auxiliary_gather/kerberoast": {
21820+
"name": "Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)",
21821+
"fullname": "auxiliary/gather/kerberoast",
21822+
"aliases": [
21823+
"auxiliary/gather/get_user_spns"
21824+
],
21825+
"rank": 300,
21826+
"disclosure_date": null,
21827+
"type": "auxiliary",
21828+
"author": [
21829+
"Alberto Solino",
21830+
"smashery"
21831+
],
21832+
"description": "This module will try to find Service Principal Names that are associated with normal user accounts.\n Since normal accounts' passwords tend to be shorter than machine accounts, and knowing that a TGS request\n will encrypt the ticket with the account the SPN is running under, this could be used for an offline\n bruteforcing attack of the SPNs account NTLM hash if we can gather valid TGS for those SPNs.\n This is part of the kerberoast attack research by Tim Medin (@timmedin).",
21833+
"references": [
21834+
"URL-https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py"
21835+
],
21836+
"platform": "",
21837+
"arch": "",
21838+
"rport": 389,
21839+
"autofilter_ports": [],
21840+
"autofilter_services": [],
21841+
"targets": null,
21842+
"mod_time": "2025-05-15 13:39:10 +0000",
21843+
"path": "/modules/auxiliary/gather/kerberoast.rb",
21844+
"is_install_path": true,
21845+
"ref_name": "gather/kerberoast",
21846+
"check": false,
21847+
"post_auth": false,
21848+
"default_credential": false,
21849+
"notes": {
21850+
"Stability": [
21851+
"crash-safe"
21852+
],
21853+
"SideEffects": [
21854+
"ioc-in-logs"
21855+
],
21856+
"Reliability": [],
21857+
"AKA": [
21858+
"GetUserSpns.py",
21859+
"get_user_spns"
21860+
]
21861+
},
21862+
"session_types": [
21863+
"ldap"
21864+
],
21865+
"needs_cleanup": false,
21866+
"actions": []
21867+
},
2185821868
"auxiliary_gather/kerberos_enumusers": {
2185921869
"name": "Kerberos Domain User Enumeration",
2186021870
"fullname": "auxiliary/gather/kerberos_enumusers",

0 commit comments

Comments
 (0)