You have not logged in. Access is limited, Please login to get full Access
Logo

Kerberos

Kerberos is a network authentication protocol designed to provide secure and encrypted authentication between users and services. It uses a ticket-based system to verify identities without transmitting passwords over the network. Developed by MIT, Kerberos is widely used in Windows Active Directory and other enterprise environments. It relies on a Key Distribution Center (KDC) to issue tickets, ensuring secure authentication and preventing credential theft through replay attacks.

Kerberoasting is a a post-exploitation attack in Active Directory.

Attackers use this technique to steal  service account passwords  without needing administrator privileges.

Understanding Kerberos
- Kerberos is a network authentication protocol used in Windows AD.  
- It uses tickets to authenticate users instead of sending passwords over the network.  

 How Kerberoasting Works   
   - Service accounts run various applications in AD (e.g., SQL Server, Web Apps).  
   - These accounts have passwords stored as  NTLM hashes  and are used to encrypt  service tickets (TGS tickets) .  
   - Attackers  request a service ticket , extract the hash, and try to  crack  it offline to recover the password.  

3.  Tools Used for Kerberoasting   
   -  Impacket  (Python-based) → `GetUserSPNs.py` script  
   -  Rubeus  (C# tool for Kerberos attacks)  
   -  Mimikatz  (Windows post-exploitation tool)  

4.  Why is this dangerous?   
   - If the service account has  weak credentials , an attacker can easily crack the hash and use it to  move laterally  in the network.  

 

Answer The Questions

Admin Panel