kerberoasting
Last updated
Was this helpful?
Last updated
Was this helpful?
All domain users can request a copy of all service accounts along with their password hashes. This allows user to request service ticket (ST) for any service w/ registered SPN (service princical name) then use the ST to crack service password.
If the service account is domain admin > Golden/Silver ticket > dumping the NTDS.dit.
If the service account is not domain admin > log into system with creds > pivot/escalate > password spray other service and domain admin accounts