π«Kerberoasting from Linux
π Overview
π― Attack Theory and Context
π What are Service Principal Names (SPNs)?
πͺ Why Kerberoasting is Effective
β‘ Attack Prerequisites
π§ Attack Scenarios and Methods
π Common Attack Vectors
π οΈ Tool Options for Linux Attacks
β οΈ Attack Effectiveness Considerations
π§ Impacket Installation and Setup
π¦ Installing Impacket Toolkit
π GetUserSPNs.py Help and Options
π― Complete Kerberoasting Workflow
π Phase 1: SPN Discovery and Enumeration
π« Phase 2: TGS Ticket Extraction
Extract All TGS Tickets
Target Specific High-Value Accounts
π Phase 3: Offline Password Cracking
Hashcat Cracking Process
β
Phase 4: Credential Validation
π― HTB Academy Lab Solutions
π Lab Questions & Solutions
π« Question 1: "Retrieve the TGS ticket for the SAPService account. Crack the ticket offline and submit the password as your answer."
π₯ Question 2: "What powerful local group on the Domain Controller is the SAPService user a member of?"
π§ Advanced Kerberoasting Techniques
π― Targeted SPN Enumeration
π Optimized Cracking Strategies
π Cross-Domain Kerberoasting
π Automation and Scripting
π Alternative Tools and Methods
π οΈ Rubeus via Wine (Linux)
π§ CrackMapExec Integration
π Custom Python Scripts
β‘ Quick Reference Commands
π§ Essential Kerberoasting Workflow
π Common SPN Patterns
π Key Takeaways
β
Attack Success Factors
π― Target Prioritization
β οΈ Detection and Evasion
π Post-Exploitation Opportunities
Last updated