Kerberoasting Attack Step by Step Guide
1. Bypass PowerShell Execution Policy
powershell -ep bypass2. Import PowerView Module
. .\PowerView.ps13. Identify Service Accounts with SPNs
Get-NetUser | Where-Object {$_.servicePrincipalName} | fl4. Enumerate SPNs in the Domain
5. Check for Existing Kerberos Tickets
6. Request a Ticket Granting Service (TGS) Ticket
7. Extract Kerberos Tickets using Mimikatz
8. Crack the Extracted Ticket
Using a Python Script
Using Hashcat for Faster Cracking
Conclusion
Last updated