Kerberoasting Attack - Post exploitation attack
Background — high-level explanation
Kerberoasting is an offline password attack that targets service accounts in Active Directory that have Service Principal Names (SPNs). Any domain user can request a Kerberos service ticket (TGS) for a service account. The ticket is encrypted with a key derived from the service account’s password (or key material). An attacker can collect those encrypted tickets and attempt to crack them offline if successful, they recover the service account password and can use it to escalate.
Objective
As a domain user, enumerate SPNs, request TGS (service) tickets from the DC, capture the encrypted TGS blobs for the SQL service account, perform offline analysis to assess password strength, and document mitigations.
Lab Environment
Walkthrough
GetUserSPNs.py from an authenticated domain user session. The script enumerated AD objects with SPNs and requested Kerberos service tickets (TGS) for each discovered SPN.Quick takeaway
This lab demonstrates why service accounts must not be domain-privileged and why service-account passwords must be strong or managed. If a service account with an SPN has weak credentials and also has Domain Admin (or other highly privileged) rights, cracking its TGS can immediately lead to full domain compromise. In short: SPNs + weak passwords + excessive privileges = catastrophic risk.
Mitigations & prioritized remediation
-
Move service to gMSA or vault the password (preferred).
-
Rotate the service account password immediately if targeted or cracked (coordinate service restart if needed).
-
Remove SPNs from user accounts; ensure SPNs are on dedicated service accounts only.
-
Enforce strong unique passwords for service accounts if gMSA not possible.
-
Disable RC4 / legacy Kerberos etypes on DCs and clients; enforce AES where supported.
-
Least-privilege for service accounts — reduce account scope to minimum required.
-
Inventory SPNs and audit pwdLastSet to find stale or weak accounts.
-
Retest in lab after fixes to verify attack does not succeed.



Comments
Post a Comment