15. Kerberoasting - from Windows
Enumerating SPNs with setspn.exe
Targeting a Single User (PowerShell)
Retrieving All Tickets Using setspn.exe (PowerShell)
Extracting Tickets from Memory with Mimikatz
Preparing the Base64 Blob for Cracking (Linux)
Placing the Output into a File as .kirbi (Linux)
Extracting the Kerberos Ticket using kirbi2john.py (Linux)
Modifying crack_file for Hashcat (Linux)
Viewing the Prepared Hash (Linux)
Cracking the Hash with Hashcat (Linux)
Using PowerView to Extract TGS Tickets (PowerShell)
Using PowerView to Target a Specific User (PowerShell)
Exporting All Tickets to a CSV File (PowerShell)
Viewing the Contents of the .CSV File (PowerShell)
Using Rubeus (PowerShell)
Using the /stats Flag (Rubeus)
Using the /nowrap Flag (Rubeus)
Last updated