Kerberoasting
Offline Service Account Password Cracking
Any domain user can request Kerberos service tickets and crack them offline to recover service account passwords — no admin rights needed.
Prerequisites:Any domain user accountNetwork access to a domain controllerRubeus.exe or Invoke-Kerberoast
1
Enumerate Kerberoastable Accounts
Kerberoasting — Step 1/5
PS C:\Tools>
Click or press Enter to skip
Step 1: Find Targets
Query AD for all user accounts with Service Principal Names (SPNs). SPNs are registered on service accounts that run things like SQL Server, IIS, or Exchange.
We are looking for "service accounts" — special accounts that run software like databases or web servers. These accounts often have weak passwords because admins set them once and forget about them.
Detection Events
4662Directory service access
Attack Flow
Request
Response
Attack
Data