Kerberos

Kerberos Attacks Cheatsheet

Kerberos Basics

  • TGT: Encrypted with krbtgt hash, valid 10h, stored in LSASS

  • TGS: Service-specific ticket granted by KDC after TGT verification

Reconnaissance

# Enumerate SPNs in domain
setspn -Q */*

# Find user SPNs (Kerberoastable)
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName

# Check if account is sensitive and cannot be delegated
Get-ADUser -Identity target_user -Properties AccountNotDelegated

# Check kerberos delegation
Get-ADComputer -Filter {TrustedForDelegation -eq $True} -Properties TrustedForDelegation

Ticket Extraction

Silver Ticket Attack

Golden Ticket Attack

Pass the Ticket Attack

Overpass the Hash

Kerberoasting

AS-REP Roasting

Delegation Attacks

Detection/Prevention

Last updated