Tool to obtain hash using MS-SNTP for user accounts
- Python 3.x
ldap3library for LDAP operations
-
Clone the repository:
git clone https://github.com/yourusername/timeroast.git cd timeroast -
Install the required Python packages:
pip install .
-u,--username: Username for authentication (required)-p,--password: Password for authentication (required)-d,--domain: Domain name (required)-H,--hash: NTLM hash for Pass-the-Hash authentication-t,--target: Target user or group to query--dc-ip: IP address of the domain controller to avoid DNS resolution issues
timesync -u <username> -p <password> -d <domain> -H <ntlm_hash> -t <target_user>Extract hash for user test in domain test.local
timesync -u test -p test -d test.local -t testExtract all hashes for users in group group1 with verbosity
timesync -u test -p test -d test.local -t group1 -vExtract all hashes for users in domain test.local
timesync -u test -p test -d test.localThis tool is intended for educational purposes and authorized penetration testing only. Unauthorized use of this tool is prohibited and may violate local, state, and federal laws.
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please open an issue or submit a pull request for any improvements or bug fixes.


