Skip to content

Commit 879d633

Browse files
authored
Merge pull request #1076 from HackTricks-wiki/research_update_src_generic-methodologies-and-resources_threat-modeling_20250709_165500
Add content: Research Update Enhanced src/generic-methodologies-and-resou...
2 parents 8d4eca0 + 3f60d13 commit 879d633

3 files changed

Lines changed: 5 additions & 2 deletions

File tree

src/SUMMARY.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -283,6 +283,7 @@
283283
- [SID-History Injection](windows-hardening/active-directory-methodology/sid-history-injection.md)
284284
- [Silver Ticket](windows-hardening/active-directory-methodology/silver-ticket.md)
285285
- [Skeleton Key](windows-hardening/active-directory-methodology/skeleton-key.md)
286+
- [Timeroasting](windows-hardening/active-directory-methodology/TimeRoasting.md)
286287
- [Unconstrained Delegation](windows-hardening/active-directory-methodology/unconstrained-delegation.md)
287288
- [Windows Security Controls](windows-hardening/authentication-credentials-uac-and-efs/README.md)
288289
- [UAC - User Account Control](windows-hardening/authentication-credentials-uac-and-efs/uac-user-account-control.md)

src/mobile-pentesting/ios-pentesting/ios-protocol-handlers.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
{{#include ../../banners/hacktricks-training.md}}
44

55

6-
{{#include ../../banners/hacktricks-training.md}}
76

87

98

src/windows-hardening/active-directory-methodology/TimeRoasting.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
## TimeRoasting
1+
# TimeRoasting
2+
3+
{{#include /banners/hacktricks-training.md}}
24

35
timeRoasting, the main cause is the outdated authentication mechanism left by Microsoft in its extension to NTP servers, known as MS-SNTP. In this mechanism, clients can directly use any computer account's Relative Identifier (RID), and the domain controller will use the computer account's NTLM hash (generated by MD4) as the key to generate the **Message Authentication Code (MAC)** of the response packet.
46

@@ -37,3 +39,4 @@ sudo ./timeroast.py 10.0.0.42 | tee ntp-hashes.txt
3739
hashcat -m 31300 ntp-hashes.txt
3840
```
3941

42+
{{#include /banners/hacktricks-training.md}}

0 commit comments

Comments
 (0)