Priv Esc - Kerberoast
Offline cracking of service account passwords.
The Kerberos session ticket (TGS) has a server portion which is encrypted with the password hash of service account. This makes it possible to request a ticket and do offline password attack.
Service accounts are many times ignored (passwords are rarely changed) and have privileged access.
Password hashes of service accounts could be used to create Silver tickets.
Get-NetUser -SPN and Resuest-SPNTicket
python.exe .\tgsrepcrack.py .\10k-worst-pass.txt 2-40a10000-student529@MSSQLSvc~dcorp-mgmt.dollarcorp.moneycorp.local-DOLLARCORP.MONEYCORP.LOCAL.kirbi
Last updated
Was this helpful?