Kerberoasting is one of the most powerful attacks against Active Directory. Any domain user can request service tickets for accounts with SPNs, and those tickets are encrypted with the account's password hash - which means they can be cracked offline.
Think of it like this: you ask the bouncer for a VIP pass (service ticket), and the pass is protected with a lock (password hash). You take the pass home and try every key until one works. The bouncer never knows you're attacking the lock.
No Special Privileges Required
The beauty of Kerberoasting is that ANY domain user can request service tickets. You don't need admin rights, just valid domain credentials.
How Kerberoasting Works
Why It Works
This is a fundamental design decision in Kerberos. Tickets MUST be encrypted with the service account's key so the service can decrypt them. Microsoft can't fix this without breaking Kerberos.
Finding Kerberoastable Accounts
Performing the Attack
From Windows
From Linux
RC4 vs AES
Older service accounts use RC4 encryption (easier/faster to crack). Newer ones might use AES256. Use /tgtdeleg in Rubeus to force RC4 when possible.
Cracking the Hashes
Cracking Speed
RC4 hashes crack at ~billions per second on modern GPUs. AES256 is slower but still feasible. Weak service account passwords fall quickly.
Using Cracked Credentials
Targeted Kerberoasting
Not all Kerberoastable accounts are equal. Prioritize based on:
- Privileged Group Membership: Admins, Backup Operators
- AdminCount = 1: Protected by AdminSDHolder
- Password Age: Old passwords might be weaker
- Account Type: Service accounts often have weak passwords
Kerberoasting Methodology
Kerberoasting Attack Flow
1
EnumerateFind all accounts with SPNs
2
PrioritizeFocus on privileged/high-value accounts
3
RequestGet service tickets for targets
4
ExtractSave hashes in hashcat format
5
CrackRun hashcat with good wordlists and rules
6
UseAuthenticate with cracked passwords
Detection & Prevention
OPSEC
Requesting many service tickets at once looks suspicious. Space out requests or target only high-value accounts to avoid detection.
Knowledge Check
Challenges
Key Takeaways
- Any domain user can Kerberoast - no special privileges needed
- Accounts with SPNs can have tickets requested and cracked offline
- Service account passwords are often weak and reused
- Use hashcat mode 13100 for RC4, 19700 for AES256
- Prioritize privileged accounts for targeted attacks
- gMSA accounts are resistant to Kerberoasting