Kerberoasting

Kerberoasting

Type 1: Using Windows and Kali Linux

Type 2: using only kali linux

Point to note:

if the SPN runs in the context of a computer account, a managed service account, or a group-managed service account, the password will be randomly generated, complex, and 120 characters long, making cracking infeasible. The same is true for the krbtgt user account which acts as service account for the KDC.

if we have GenericWrite or GenericAll permissions on another AD user account.

We can reset the user password.

Click here to check if user has GenericAll or GenericWrite permission.

Then we will set SPN for the user, Kerberoast the account and crack the password hash.

This type of attack is known as targeted Kerberoasting

Last updated