1. we will use kerberoast github tool to get users SPNs. github.com/nidem/kerberoast
after launching this script it will give us a list of useraccount in AD that have SPN associate with it.
PS C:\kerberoast> .\GetUserSPNs.ps1
2. once a list of target account is obtained then attacker request service tickets to AD using spn values.
as we can see we have got the ticket.
3. now we will use mimikatz to dump the ticket out to disk from memory.
this ticket is encrypted using mysql service account ntlm password hash. now we need take off this ticket offline to start cracking it using dictionary attack.
4.
For solution check stealthbits attack catalog attack to product mapping pdf file.
Avi
Comments
Post a Comment