Kerberoasting Attack Step by Step Guide
Step 1: Enumerate Domain Users with SPN
Kerberoasting targets accounts with Service Principal Names (SPNs). First, enumerate users with SPNs.
Command:
Alternatively, using Impacket:
Step 2: Request a Ticket Granting Service (TGS) Ticket
Once an SPN is found, request a TGS ticket for that service.
Command:
or using Rubeus:
Step 3: Extract and Save TGS Hashes
The obtained TGS hash can be extracted for offline cracking.
Command:
or
Step 4: Crack the TGS Hash Offline
Use Hashcat to crack the extracted hash.
Command:
or using John the Ripper:
Step 5: Use the Obtained Credentials
If the hash is successfully cracked, use the password to access the service or escalate privileges.
Command to test access:
or using Evil-WinRM:
Mitigation Steps:
Enforce strong passwords for service accounts.
Regularly rotate service account passwords.
Implement the principle of least privilege.
Monitor Kerberos ticket requests for anomalies.
Let me know if you need additional details or modifications!
Last updated