Kerberoast
Last updated
Last updated
#powerview #powershell #ldap #rubeus #mimikatz #impacket
ST can be requested by any user for any service if it's is registered in the domain.
STs are encrypted with the service account which runs the service.
Hence, we can try to crack the password of the service user account.
In case of managed service accounts, the password is of 120 characters and changes every month, hence it is not possible to crack their password.
However, some services are run with normal user accounts, managed by people, that can have weak password.
Kerberoast involves service running under regular user accounts. We can request STs for the services and crack password locally. We can query for users with SPNs using
Powerview
LDAP
AD-RSAT (Active Directory module)
Rubeus
Impacket's GetUserSPNs.py
script can be used to query users with SPN and request STs for the service.
Requesting a TGS using powrshell
Powerview
Rubeus
If we have GenericAll
or GenericWrite
over a user, we can set a random SPN for that user, and request ST for it. This is opsec friendly as resetting a user password is noisy. SPN for a user can be set using (SPN should be unique for the forest):