 
        Kerberos is a network authentication protocol designed to provide secure and encrypted authentication between users and services. It uses a ticket-based system to verify identities without transmitting passwords over the network. Developed by MIT, Kerberos is widely used in Windows Active Directory and other enterprise environments. It relies on a Key Distribution Center (KDC) to issue tickets, ensuring secure authentication and preventing credential theft through replay attacks.
Kerberoasting is a a post-exploitation attack in Active Directory.
Attackers use this technique to steal service account passwords without needing administrator privileges.
Understanding Kerberos
- Kerberos is a network authentication protocol used in Windows AD.  
- It uses tickets to authenticate users instead of sending passwords over the network.  
 How Kerberoasting Works   
   - Service accounts run various applications in AD (e.g., SQL Server, Web Apps).  
   - These accounts have passwords stored as  NTLM hashes  and are used to encrypt  service tickets (TGS tickets) .  
   - Attackers  request a service ticket , extract the hash, and try to  crack  it offline to recover the password.  
3.  Tools Used for Kerberoasting   
   -  Impacket  (Python-based) → `GetUserSPNs.py` script  
   -  Rubeus  (C# tool for Kerberos attacks)  
   -  Mimikatz  (Windows post-exploitation tool)  
4.  Why is this dangerous?   
   - If the service account has  weak credentials , an attacker can easily crack the hash and use it to  move laterally  in the network.