Kerberoasting
Last updated
Last updated
This attack takes advantage of service accounts that use Kerberos authentication.
First we request a TGT (Ticket Granting Ticket) from the KDC using the account we compromised. Next we request a TGS (Ticket Granting Service ticket) as well. The key flaw is that the TGS is encrypted with the Services account password hash.
Using the tool GetUserSPNs to request a TGS and obtain the Service accounts password hash.
Strong password policy
Principle of least privilege
Service accounts should NOT be Domain Administrators