Skip to content

Conversation

@h00die
Copy link
Contributor

@h00die h00die commented Jan 18, 2026

fixes #20871
fixes #20872

Drafted while I finish up hash_crack_validator.rb

@h00die
Copy link
Contributor Author

h00die commented Jan 18, 2026

Use crack_windows in hashcat mode:

[+] Cracked Hashes
==============

 DB ID  Hash Type       Username        Cracked Password  Method
 -----  ---------       --------        ----------------  ------
 121    krb5tgs-rc4     krb5tgs-rc4     Password1!        Already Cracked/POT
 122    krb5tgs-aes128  krb5tgs-aes128  hashcat           Already Cracked/POT
 123    krb5tgs-aes256  krb5tgs-aes256  hashcat           Already Cracked/POT
 124    krb5asrep-rc4   krb5asrep-rc4   hashcat           Already Cracked/POT
 125    timeroast       timeroast       hashcat           Already Cracked/POT

nil
when /^krb5$/
return "#{cred.id}:#{cred.private.data}"
# when /^krb5$/
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we concerned about the exact krb5 string not being matched against any cred private type anymore? e.g. would we miss any matches and fall through? /^(krb5.|timeroast$)/ matches different values than /^krb5$/.

@h00die
Copy link
Contributor Author

h00die commented Jan 25, 2026

#20881 is a prerequisite as I pulled out a bunch of the john fixes to make this easier to look at.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Todo

Development

Successfully merging this pull request may close these issues.

Timeroast Cracking Support Kerberoast Improvements

3 participants