🟢Kerberoast
Find user accounts used as service accounts
Reguest a TGS
or
Export ticket using Mimikatz
Crack the ticket
Crack the password for the service account
Analyzing the ticket with Rubeus
Once you have exported the ticket using Mimikatz, analyze it with Rubeus to get the hash for cracking.
Investigate the contents of ticket.txt
for the hash to use in the next step.
Using Hashcat for password recovery
Now that you have the hash, proceed with Hashcat to attempt to recover the password.
Inspect cracked.txt
to see if the password recovery was successful. If the password is not found, consider using a larger or more targeted wordlist based on password creation policies.
Post-compromise steps
After successfully cracking the ticket:
Secure the compromised account immediately by resetting its password.
Investigate how the service account credentials were exposed.
Audit services that utilize this account to check for unauthorized changes or activities.
Implement account monitoring to detect future suspicious activities.
Last updated