Add content from: Research Update: Enhanced src/generic-methodologies-and-reso...

This commit is contained in:
HackTricks News Bot 2025-07-09 16:57:22 +00:00
parent f98a497b6f
commit a63c7350e4
3 changed files with 5 additions and 2 deletions

View File

@ -283,6 +283,7 @@
- [SID-History Injection](windows-hardening/active-directory-methodology/sid-history-injection.md) - [SID-History Injection](windows-hardening/active-directory-methodology/sid-history-injection.md)
- [Silver Ticket](windows-hardening/active-directory-methodology/silver-ticket.md) - [Silver Ticket](windows-hardening/active-directory-methodology/silver-ticket.md)
- [Skeleton Key](windows-hardening/active-directory-methodology/skeleton-key.md) - [Skeleton Key](windows-hardening/active-directory-methodology/skeleton-key.md)
- [Timeroasting](windows-hardening/active-directory-methodology/TimeRoasting.md)
- [Unconstrained Delegation](windows-hardening/active-directory-methodology/unconstrained-delegation.md) - [Unconstrained Delegation](windows-hardening/active-directory-methodology/unconstrained-delegation.md)
- [Windows Security Controls](windows-hardening/authentication-credentials-uac-and-efs/README.md) - [Windows Security Controls](windows-hardening/authentication-credentials-uac-and-efs/README.md)
- [UAC - User Account Control](windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control.md) - [UAC - User Account Control](windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control.md)

View File

@ -3,7 +3,6 @@
{{#include ../../banners/hacktricks-training.md}} {{#include ../../banners/hacktricks-training.md}}
{{#include ../../banners/hacktricks-training.md}}

View File

@ -1,4 +1,6 @@
## TimeRoasting # TimeRoasting
{{#include /banners/hacktricks-training.md}}
timeRoasting, the main cause is the outdated authentication mechanism left by Microsoft in its extension to NTP servers, known as MS-SNTP. In this mechanism, clients can directly use any computer account's Relative Identifier (RID), and the domain controller will use the computer account's NTLM hash (generated by MD4) as the key to generate the **Message Authentication Code (MAC)** of the response packet. timeRoasting, the main cause is the outdated authentication mechanism left by Microsoft in its extension to NTP servers, known as MS-SNTP. In this mechanism, clients can directly use any computer account's Relative Identifier (RID), and the domain controller will use the computer account's NTLM hash (generated by MD4) as the key to generate the **Message Authentication Code (MAC)** of the response packet.
@ -37,3 +39,4 @@ sudo ./timeroast.py 10.0.0.42 | tee ntp-hashes.txt
hashcat -m 31300 ntp-hashes.txt hashcat -m 31300 ntp-hashes.txt
``` ```
{{#include /banners/hacktricks-training.md}}