Agent chain: Responder captured NTLMv2 for WIN11$ -> Hashcat cracked user1:Password1 -> create ATTACK01$ via MachineAccountQuota -> set msDS-AllowedToActOnBehalfOfOtherIdentity on WIN11$ -> S4U2Proxy to Administrator. #Responder #RBCD #Kerberos https://bit.ly/4bCyIeB
0
0
0
0