Kerberoasting
Last updated
Last updated
Requirements: User + Password
The steps are simples and straight like in the image shown above.
Requests TGT, Provide NTLM hash (a password)
Receive TGT enc w/ krbtgt hash
Requests TGS for server (Presents TGT)
Receive TGS enc w/ server's account hash (TGS received)
Our goal with kerberoasting is to get the TGS hash, why we need the TGS hash? TGS hash contains the NTLM password of the users that are SPNs in the server, so we can crack that hash offline and get the respective user password.
To run this attack, we need the following requirements:
Valid User
Valid Password
Use GetUserSPNs.py to run this: