Dark Mode
Capec-509 Detail
Kerberoasting
Detailed Software Typical Severity: High
Parents: 652
Threats: T71 T75 T279 T283 T385 T388 T398 T402
Through the exploitation of how service accounts leverage Kerberos authentication with Service Principal Names (SPNs), the adversary obtains and subsequently cracks the hashed credentials of a service account target to exploit its privileges. The Kerberos authentication protocol centers around a ticketing system which is used to request/grant access to services and to then access the requested services. As an authenticated user, the adversary may request Active Directory and obtain a service ticket with portions encrypted via RC4 with the private key of the authenticated account. By extracting the local ticket and saving it disk, the adversary can brute force the hashed value to reveal the target account credentials.
Not present
Explore
-
Scan for user accounts with set SPN values
-
Request service tickets
| Techniques |
|---|
| These can be found via Powershell or LDAP queries, as well as enumerating startup name accounts and other means. |
| Techniques |
|---|
| Using user account's SPN value, request other service tickets from Active Directory |
Experiment
-
Extract ticket and save to disk
| Techniques |
|---|
| Certain tools like Mimikatz can extract local tickets and save them to memory/disk. |
Exploit
-
Crack the encrypted ticket to harvest plain text credentials
| Techniques |
|---|
| Leverage a brute force application/script on the hashed value offline until cracked. The shorter the password, the easier it is to crack. |
- The adversary requires access as an authenticated user on the system. This attack pattern relates to elevating privileges.
- The adversary requires use of a third-party credential harvesting tool (e.g., Mimikatz).
- The adversary requires a brute force tool.
Not present
| Medium |
|---|
| Confidentiality |
|---|
| Gain Privileges |
- PowerSploit's Invoke-Kerberoast module can be leveraged to request Ticket Granting Service (TGS) tickets and return crackable ticket hashes. [REF-585] [REF-586]