Kerberoasting

Kerberoasting exploits how Kerberos works: any authenticated domain user can request service tickets for any SPN (Service Principal Name). Service tickets are encrypted with the service account's NT hash - which can be brute-forced offline.

Ready Click Next Step to walk through the Kerberoasting attack chain.
Attack State
Attacker
PASSIVE
KDC
RUNNING
SPN Details
Account -
SPN -
Ticket Type -
Hash Format -
Cracking Status
Algorithm -
Speed -
Status -
Event Log