Kerberos is a network authentication protocol designed to provide secure and encrypted authentication between users and services. It uses a ticket-based system to verify identities without transmitting passwords over the network. Developed by MIT, Kerberos is widely used in Windows Active Directory and other enterprise environments. It relies on a Key Distribution Center (KDC) to issue tickets, ensuring secure authentication and preventing credential theft through replay attacks.
What is Kerberoasting?
Kerberoasting is an attack that allows an attacker to extract Kerberos service tickets (TGS) from Active Directory (AD) and crack them offline to recover plaintext passwords of service accounts.
Why is this attack dangerous?
● It does not require admin privileges—any domain user can request Kerberos tickets.
● Service accounts often have weak passwords and high privileges.
● Since the attack is offline, it does not generate authentication failures in logs.
________________________________________
How Kerberoasting Works? (Step-by-Step)
Step 1: Attacker Gets a Valid Domain User Account
● Any authenticated domain user can perform Kerberoasting.
● The attacker does not need to be an admin.
Step 2: Request a Service Ticket (TGS) for a Service Account
● The attacker queries Service Principal Names (SPNs) linked to service accounts.
● SPNs are used by Kerberos to map services to user accounts.
Example Command to Find Service Accounts (PowerView)
Get-NetUser -SPN
Step 3: Extract Kerberos Tickets from Memory
● The attacker requests a TGS ticket from the Domain Controller (DC).
● The TGS ticket is encrypted with the NTLM hash of the service account’s password.
Example Command to Request TGS Tickets (Rubeus)
Rubeus.exe kerberoast /format:hashcat
Step 4: Crack the Ticket Offline to Reveal the Password
● The attacker extracts the TGS hash and cracks it offline using hashcat or John the Ripper.
Example Hashcat Command (Cracking TGS Ticket)
hashcat -m 13100 <ticket_hash> rockyou.txt --force
Step 5: Use the Recovered Password for Privilege Escalation
● If the service account has admin privileges, the attacker can move laterally or escalate privileges.
● The attacker may perform Pass-the-Hash, DCSync, or Golden Ticket attacks.
________________________________________
Tool |
Usage |
PowerView |
Enumerate service accounts with SPNs |
Rubeus |
Request TGS tickets & extract hashes |
Mimikatz |
Dump Kerberos tickets from memory |
Impacket (GetUserSPNs.py) |
Enumerate SPNs & extract tickets |
Hashcat |
Crack TGS hashes offline |
John the Ripper |
Alternative for cracking hashes |
________________________________________
Example Commands for Each Tool
1. PowerView (Find SPNs for Kerberoasting)
Get-NetUser -SPN
Find service accounts with SPNs (targets for Kerberoasting).
________________________________________
2. Rubeus (Request TGS Tickets)
Rubeus.exe kerberoast /format:hashcat
Extracts service ticket hashes for offline cracking.
________________________________________
3. Mimikatz (Dump Kerberos Tickets)
privilege::debug
sekurlsa::tickets /export
Extracts Kerberos tickets from memory.
________________________________________
4. Impacket (Python Script for SPN Enumeration)
python3 GetUserSPNs.py -request DOMAIN/USER:PASSWORD@DC_IP
Lists all SPNs & requests their Kerberos tickets.
________________________________________
5. Crack the Hash with Hashcat
hashcat -m 13100 <ticket_hash> rockyou.txt --force
Uses dictionary attacks to recover plaintext passwords.
________________________________________
How to Detect & Prevent Kerberoasting?
Detection (Blue Team)
● Monitor Event ID 4769 (TGS requests with RC4 encryption).
● Look for multiple TGS requests from a single user (suspicious activity).
● Use Sysmon + SIEM tools to track unusual Kerberos activity.
Prevention (Security Hardening)
________________________________________
Summary
● Kerberoasting targets service accounts in AD to extract TGS tickets and crack passwords offline.
● Attackers need only a valid domain user to launch this attack.
● Defenses include strong passwords, AES encryption, and log monitoring.
Here are 15 one-word questions with their corresponding answers and hints based on the content about Kerberoasting Attack: