π«Kerberoasting from Windows
π Overview
π― Strategic Context
π§ Windows vs Linux Kerberoasting
β‘ Attack Scenarios
π§ Semi-Manual Kerberoasting Method
π Phase 1: SPN Enumeration with setspn.exe
π« Phase 2: Manual TGS Ticket Request via PowerShell
πΎ Phase 3: Ticket Extraction with Mimikatz
π Phase 4: Ticket Processing for Hashcat
π Phase 5: Offline Cracking
β‘ Automated PowerView Method
π SPN Enumeration with PowerView
π« Targeted Ticket Extraction
π Rubeus: The Ultimate Kerberoasting Tool
π Rubeus Overview and Capabilities
π Statistical Analysis with Rubeus
π― Targeted High-Value Account Extraction
π― Advanced Rubeus Features
π Encryption Types Analysis
π Understanding Kerberos Encryption Types
β‘ RC4 vs AES Performance Comparison
RC4 Cracking Example:
AES256 Cracking Example:
π Encryption Type Downgrade Attack
π― HTB Academy Lab Solutions
π Lab Questions & Solutions
π Question 1: "What is the name of the service account with the SPN 'vmware/inlanefreight.local'?"
π Question 2: "Crack the password for this account and submit it as your answer."
π§ Advanced Windows Kerberoasting Techniques
π― Stealth Considerations
π LDAP Filter Examples
π Automation Script Example
π‘οΈ Mitigation and Detection
π§ Defensive Measures
π Detection Strategies
π Group Policy Configuration
β‘ Quick Reference Commands
π§ Essential Windows Kerberoasting Workflow
π Tool Comparison Matrix
π Key Takeaways
β
Windows Kerberoasting Advantages
π― Strategic Considerations
β οΈ Operational Notes
π Post-Exploitation Opportunities
Last updated