Kerberoasting
Kerberoasting
It is an attack against service accounts. Since the service tickets are encrypted with ntlm hash of service account and any domain user is able to request service ticket for any service on the machine, in this attack we request service ticket from the Ticket Granting Server in the DC and extract the ntlm hash of that service by bruteforcing with hashcat or john offline. Here we always target user accounts that are used as service accounts because regular service account passwords are generated by DC and quiet random and hard to bruteforce and also are changed frequenly automatically.
Find user accounts used as Service accounts
Using AD module
Using PowerView
Using rubeus to list kerberoast stats
Use Rubeus to request a ST
To avoid detections based on Encryption Downgrade for Kerberos EType(used by likes of MDI -0x17 stands for rc4-hmac), look for Kerberoastableaccounts that only support RC4_HMAC
Kerberoast all possible accounts
Crack the ticket using john the ripper
After this create powershell credential object and use Enter-PSSession to access the computer where the user has admin rights or is able to access.
Last updated