Kerberoasting
Introduction
Kerberoasting is an attack technique that attempts to obtain a password hash of an Active Directory account that has a Service Principal Name (SPN).
How it works: An unauthenticated domain user can request a Kerberos ticket for an SPN. The kerberos ticket is encrypted with the hash of the service account. Adversaries then work offline to crack the password hash.
Rubeus
Crack Passwords
Note: some hash formats can incompatibility with john.
Removing the SPN so it became: $krb5tgs$23$*mssql_svc$dev.domain.lab*$6A9E[hash]
seemed to address the issue.
Safer Method
Note: By default, Rubeus will roast every account that has an SPN. Honey Pot accounts can be configured that will catch these type of attacks.
Enumerate SPN accounts
Rubeus /user
Roast an indiviual account with the /user parameter
Last updated