From ca959ec806359cb7252078ffe1d30022aa090fd5 Mon Sep 17 00:00:00 2001 From: NocFlame Date: Wed, 25 May 2022 10:04:41 +0200 Subject: [PATCH] Added missing parenthese --- Methodology and Resources/Windows - Using credentials.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Methodology and Resources/Windows - Using credentials.md b/Methodology and Resources/Windows - Using credentials.md index 784f4116..c7a5b3cd 100644 --- a/Methodology and Resources/Windows - Using credentials.md +++ b/Methodology and Resources/Windows - Using credentials.md @@ -328,7 +328,7 @@ klist ## SSH -:warning: You cannot pass the hash to SSH, but you can connect with a Kerberos ticket (Which you can get by passing the hash! +:warning: You cannot pass the hash to SSH, but you can connect with a Kerberos ticket (Which you can get by passing the hash!) ```ps1 cp user.ccache /tmp/krb5cc_1045 @@ -339,4 +339,4 @@ ssh -o GSSAPIAuthentication=yes user@domain.local -vv - [Ropnop - Using credentials to own Windows boxes](https://blog.ropnop.com/using-credentials-to-own-windows-boxes/) - [Ropnop - Using credentials to own Windows boxes Part 2](https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-2-psexec-and-services/) -- [Gaining Domain Admin from Outside Active Directory](https://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html) \ No newline at end of file +- [Gaining Domain Admin from Outside Active Directory](https://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html)