Targeted Kerberoasting
This abuse can be carried out when controlling an object that has a GenericAll
, GenericWrite
, WriteProperty
or Validated-SPN
over the target. A member of the Account Operator group usually has those permissions.
The attacker can add an SPN (ServicePrincipalName
) to that account. Once the account has an SPN, it becomes vulnerable to Kerberoasting. This technique is called Targeted Kerberoasting.
From UNIX-like systems, this can be done with targetedKerberoast.py (Python)
bash
targetedKerberoast.py -v -d "$DC_HOST" -u "$USER" -p "$PASSWORD"
Once the Kerberoast hash is obtained, it can possibly be cracked to recover the account's password if the password used is weak enough.