HunnicCyber / SharpSniper

Find specific users in active directory via their username and logon IP address
375 stars 55 forks source link

Password hash input #1

Closed ronnieflip closed 4 years ago

ronnieflip commented 4 years ago

Note an issue per-say: Am wondering how i can make this be able to support a hash for the password input

HunnicCyber commented 4 years ago

https://docs.microsoft.com/en-us/dotnet/api/system.diagnostics.eventing.reader.sessionauthentication

I believe there might be a away.

I go it a go over the weekend and would appreciate any progress you make to be shared.

Tom

On Fri, 13 Sep 2019, 4:05 pm ronnieflip, notifications@github.com wrote:

Am wondering how i can make this be able to support a hash for the password input

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/HunnicCyber/SharpSniper/issues/1?email_source=notifications&email_token=ALOF3ZPXLINKB22X2BEF2QTQJOM3LA5CNFSM4IWQLQ32YY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4HLH267A, or mute the thread https://github.com/notifications/unsubscribe-auth/ALOF3ZIPYRPRMXPKZII53M3QJOM3LANCNFSM4IWQLQ3Q .

ronnieflip commented 4 years ago

Interesting reference mate. I'll leave this open so that i can post my solution here. Thanks

bao7uo commented 4 years ago

Enabled in #2 due to support for authenticating with the process user's token. Use mimikatz etc. to pth and then SharpSniper.exe username will do the trick :)