From a63c7350e4ee3dafbeb6eb15375d627ae5bb1d85 Mon Sep 17 00:00:00 2001 From: HackTricks News Bot Date: Wed, 9 Jul 2025 16:57:22 +0000 Subject: [PATCH] Add content from: Research Update: Enhanced src/generic-methodologies-and-reso... --- src/SUMMARY.md | 1 + .../ios-pentesting/ios-protocol-handlers.md | 1 - .../active-directory-methodology/TimeRoasting.md | 5 ++++- 3 files changed, 5 insertions(+), 2 deletions(-) diff --git a/src/SUMMARY.md b/src/SUMMARY.md index d57d5effd..a8361fb1f 100644 --- a/src/SUMMARY.md +++ b/src/SUMMARY.md @@ -283,6 +283,7 @@ - [SID-History Injection](windows-hardening/active-directory-methodology/sid-history-injection.md) - [Silver Ticket](windows-hardening/active-directory-methodology/silver-ticket.md) - [Skeleton Key](windows-hardening/active-directory-methodology/skeleton-key.md) + - [Timeroasting](windows-hardening/active-directory-methodology/TimeRoasting.md) - [Unconstrained Delegation](windows-hardening/active-directory-methodology/unconstrained-delegation.md) - [Windows Security Controls](windows-hardening/authentication-credentials-uac-and-efs/README.md) - [UAC - User Account Control](windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control.md) diff --git a/src/mobile-pentesting/ios-pentesting/ios-protocol-handlers.md b/src/mobile-pentesting/ios-pentesting/ios-protocol-handlers.md index ec81a1ed4..3e6f504eb 100644 --- a/src/mobile-pentesting/ios-pentesting/ios-protocol-handlers.md +++ b/src/mobile-pentesting/ios-pentesting/ios-protocol-handlers.md @@ -3,7 +3,6 @@ {{#include ../../banners/hacktricks-training.md}} -{{#include ../../banners/hacktricks-training.md}} diff --git a/src/windows-hardening/active-directory-methodology/TimeRoasting.md b/src/windows-hardening/active-directory-methodology/TimeRoasting.md index 0ef155ea1..6311a1c89 100644 --- a/src/windows-hardening/active-directory-methodology/TimeRoasting.md +++ b/src/windows-hardening/active-directory-methodology/TimeRoasting.md @@ -1,4 +1,6 @@ -## TimeRoasting +# TimeRoasting + +{{#include /banners/hacktricks-training.md}} timeRoasting, the main cause is the outdated authentication mechanism left by Microsoft in its extension to NTP servers, known as MS-SNTP. In this mechanism, clients can directly use any computer account's Relative Identifier (RID), and the domain controller will use the computer account's NTLM hash (generated by MD4) as the key to generate the **Message Authentication Code (MAC)** of the response packet. @@ -37,3 +39,4 @@ sudo ./timeroast.py 10.0.0.42 | tee ntp-hashes.txt hashcat -m 31300 ntp-hashes.txt ``` +{{#include /banners/hacktricks-training.md}}