kerberoasting
All domain users can request a copy of all service accounts along with their password hashes. This allows user to request service ticket (ST) for any service w/ registered SPN (service princical name) then use the ST to crack service password.
Usage
impacket
using powerview
using rubeus
post kerberoasting
If the service account is domain admin > Golden/Silver ticket > dumping the NTDS.dit.
If the service account is not domain admin > log into system with creds > pivot/escalate > password spray other service and domain admin accounts
Last updated