MODULE

NTP Timeroast

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

NTP Timeroast

Created
12/20/2024

Description

Windows authenticates NTP requests by calculating the message digest using the NT hash followed by the first 48 bytes of the NTP message (all fields preceding the key ID). An attacker can abuse this to recover hashes that can be cracked offline for machine and trust accounts. The attacker must know the accounts RID, but because RIDs are sequential, they can easily be enumerated.

Author(s)

  • Tom Tervoort
  • Spencer McIntyre

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/ntp/timeroast
msf auxiliary(timeroast) > show actions
    ...actions...
msf auxiliary(timeroast) > set ACTION < action-name >
msf auxiliary(timeroast) > show options
    ...show and set options...
msf auxiliary(timeroast) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;