Obj 14 Kerberoast Pass Crack
Task - Using the Kerberoast attack, crack password of a SQL server service account.
We first need to find out services running with user accounts as the services running with machine accounts have difficult passwords. We can use PowerView’s (Get-DomainUser –SPN) or ActiveDirectory module for discovering such services:
Get Domain User SPN
This shows us that svcadmin has a SPN that we can kerberoast
Use Rubeus and John the Ripper to get the hash and crack it
We can now use the file hashes.txt we just created with John the Ripper
We need to change this in the hashes.txt file first!
moneycorp.local:1433*
needs to be
moneycorp.local*
- OPTION 2 -
KerberosRequestorSecurityToken.NET class from PowerShell, Mimikatz and tgsrepcrack.py
Use the KerberosRequestorSecurityToken.NET class from PowerShell to request a TGS
Check to see if we have the TGS for the service now
Let's dump the tickets to disk
Now we have a kirbi file we crack with tgsrepcrack.py
Last updated