Kerberoasting
Overview
What is Kerberoasting?
Key Concepts
Attack Flow
Why Kerberoasting Works
Kerberos Authentication Flow
Normal Kerberos Process
Kerberoasting Exploitation
Discovery and Enumeration
Finding SPNs with PowerShell
LDAP Enumeration
BloodHound Enumeration
Attack Tools and Techniques
GetUserSPNs.py (Impacket)
Rubeus (Windows)
PowerShell Empire/PowerSploit
CrackMapExec Integration
Hash Cracking
Hash Formats
Hashcat Cracking
John the Ripper
Custom Wordlists
Post-Exploitation
Using Cracked Credentials
Lateral Movement
Token Impersonation
Overview
What are Tokens?
Token Types
Token Impersonation Techniques
Token Impersonation After Kerberoasting
Advanced Techniques
Targeted Kerberoasting
ASREPRoasting Integration
Golden/Silver Ticket Preparation
Defense and Detection
Preventive Measures
Detection Strategies
Honeypot Service Accounts
Practical Attack Scenarios
Scenario 1: SQL Server Service Account
Scenario 2: Web Application Service Account
Scenario 3: Exchange Service Account
Automation and Scripting
Automated Kerberoasting Script
Python Integration
Mitigation Best Practices
Service Account Security
Monitoring Implementation
Network Segmentation
Last updated