Kerberos Attack

January 2020

Introduction

Kerberos arrow-up-rightis an authentication protocol that used to identify a user with provided the secret code, but it does not provide the validation on the resources access. Kerberos is used in Active Directory.

The following are the attack strategy according to the privileges you have. Thus, perform the first attacks only connectivity with the DC (Domain Controller) is required, which is the KDC (Key Distribution Center) for the AD (Active Directory) network. Whereas, the last attack requires a user being a Domain Administrator or having similar privileges.

  • Kerberos brute-force

  • ASREPRoast

  • Kerberoasting

  • Pass the key

  • Pass the ticket

  • Silver ticket

  • Golden ticket

Kerberos Attack Methods

Tools

Bruteforcing

With kerbrute.pyarrow-up-right:

ASREPRoast

With Impacketarrow-up-right example GetNPUsers.py, Lab Example: https://calvin-lai.gitbook.io/calvin-lai-security/hack-the-box-writeup/windows-machine/blackfield#enumeration-through-rpcarrow-up-right

Kerberoasting

With Impacketarrow-up-right example GetUserSPNs.py:

With Powershell:

Cracking with dictionary of passwords:

Pass The Hash (PtH)

By using Impacketarrow-up-right examples

Lab Example: OSCP Lab SV-DC01, SVCClient17x (10.11.1.20 - 10.11.1.24)

With Rubeusarrow-up-right and PsExecarrow-up-right:

Pass The Ticket (PtT)

With Mimikatzarrow-up-right:

With Rubeusarrow-up-right in Powershell:

To convert tickets between Linux/Windows format with ticket_converter.pyarrow-up-right:

Using ticket in Windows

Inject ticket with Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Silver ticket

With Impacketarrow-up-right examples:

With Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Golden ticket

With Impacketarrow-up-right examples:

With Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Last updated

Was this helpful?