Attacking Active Directory - Kerberoasting

Поділитися
Вставка
  • Опубліковано 15 чер 2024
  • Kerberoasting is an extremely useful attack method to establish persistence, lateral movement, or privilege escalation in a Windows Active Directory environment. This attack is caused by a user requesting a TGS for an account, typically a service account, that has a Service Principal Name (SPN) associated with it. An attacker could then use the TGS which is encrypted with the service account's NTLM password hash to crack the hash offline.
    This video uses GetUserSPNs.py from Impacket.
    Join my new Discord server: discord.gg/9CvTtHqWCX
    Follow me on Twitter for updates: / 0xconda
    If you found this video helpful and would like to support future creations, please considering visiting the following links:
    Buy Me a Coffee: www.buymeacoffee.com/conda
    Check out Impacket: github.com/SecureAuthCorp/imp...
    00:00 What is Kerberoasting
    05:06 Kerberoasting Setup in Lab
    07:40: Kerberoasting Demo
    12:21 Kerberoasting Mitigation

КОМЕНТАРІ • 57

  • @plugandplayreviews
    @plugandplayreviews 3 роки тому +13

    CONDA is the best infosec UA-camr of all time. Respect bro!!

    • @c0nd4
      @c0nd4  3 роки тому +1

      Thanks so much!

  • @ElCyberWizard
    @ElCyberWizard Рік тому +3

    I’ve been working on my GPEN cert and your content has been very helpful with tying everything together at the end of each section!

  • @dawnS33ker
    @dawnS33ker Рік тому +1

    Very clear and concise video. Thank you Brandon,

  • @Xx-nd1rs
    @Xx-nd1rs 11 місяців тому +1

    I like the way you explain things, very simple, clear, informative, organized and get to the point. thanks a loot!

    • @c0nd4
      @c0nd4  11 місяців тому

      Thank you!

  • @randomguy3784
    @randomguy3784 2 роки тому +2

    Neat and Comprehensive presentation!
    Great work man.

    • @c0nd4
      @c0nd4  2 роки тому +1

      Thank you!

  • @Stephanus21
    @Stephanus21 Рік тому +1

    Thank you , just started to watch your stuff and you do an amazing job of showing and explaining exactly how it works , thank you so much!

    • @c0nd4
      @c0nd4  Рік тому +1

      Thank you!

  • @x7331x
    @x7331x 2 місяці тому +1

    Great on-point explanation of the attack 👏

  • @csheldon3636
    @csheldon3636 Рік тому

    Excellent video. A lot easier than the OSCP explanation.

  • @chrislearnsIT
    @chrislearnsIT 2 роки тому +1

    Thanks for the high quality content! I just subscribed.

    • @c0nd4
      @c0nd4  2 роки тому

      Thank you!

  • @Eggsec
    @Eggsec Рік тому +1

    Thank you for the valuable information much appreciated.

  • @offlife77
    @offlife77 2 роки тому +1

    Awesome mate, keep them coming!

  • @DanEather
    @DanEather 2 роки тому

    Great vid. Clearly presented. Thanks!

  • @teedeearr
    @teedeearr 10 місяців тому

    I found this very informative. Thanks

  • @jaylal4899
    @jaylal4899 2 роки тому +2

    Very good video! It's much easier to understand kerberoasting with a practical example. Any chance you can make a video on how to compile windows kernel exploits using Visual Studio?

  • @crash9706
    @crash9706 3 роки тому +2

    Yesss more AD. Love the content. Keep it up ❤️

    • @c0nd4
      @c0nd4  3 роки тому

      Thanks! I appreciate it

  • @harshil.
    @harshil. 2 роки тому +5

    Great video bro definitely enjoyed it the whole way through. I'm sure this video will get a bunch of traction now that AD is on the OSCP lmao

    • @c0nd4
      @c0nd4  2 роки тому

      I appreciate it!

    • @morality1995
      @morality1995 2 роки тому +4

      I'm literally watching this video prepping to take the new OSCP exam lol

  • @heibai0139
    @heibai0139 11 місяців тому +1

    Great video, much helper than OSCP 23' course materials, appreciate

  • @jcgm666
    @jcgm666 2 роки тому +1

    Very good explanation! Subscribed

    • @c0nd4
      @c0nd4  2 роки тому

      Thank you!

  • @ca7986
    @ca7986 3 роки тому +1

    You are awesome mate! Gold videos. ❤️

    • @c0nd4
      @c0nd4  3 роки тому

      Thank you! Really appreciate it

  • @quentingauthier430
    @quentingauthier430 3 роки тому +2

    Dude, you make awesome videos

    • @c0nd4
      @c0nd4  3 роки тому

      Thank you! I really appreciate the support

  • @aahringer
    @aahringer Рік тому

    Well done! Thank you!

  • @GodlyTank
    @GodlyTank 11 місяців тому

    Thanks a bunch for this

  • @real.xplo1t
    @real.xplo1t 3 роки тому +1

    Perfect explanation

    • @c0nd4
      @c0nd4  3 роки тому +1

      Thank you!

  • @vikassrivastava2058
    @vikassrivastava2058 Рік тому

    Great content

  • @grandmakisses9973
    @grandmakisses9973 3 роки тому +2

    Let’s go, I love ad vids

    • @c0nd4
      @c0nd4  3 роки тому

      Me too! Can't wait to do more

  • @enleak
    @enleak 3 роки тому +1

    Lets goo!

  • @aahringer
    @aahringer Рік тому

    Thanks!

    • @c0nd4
      @c0nd4  Рік тому

      Thank you so much! Very kind of you!

  • @Umar0x01
    @Umar0x01 3 роки тому +1

    Best!!!

  • @quad7375
    @quad7375 9 місяців тому

    can you go over more AD attacks, golden ticket, silver, dc sync, etc

  • @ajayk643
    @ajayk643 2 роки тому +1

    Subscribed :) :)

  • @danielriofrio199
    @danielriofrio199 Рік тому

    Hey! I was wondering if you could explain something to me please:
    Per MITRE ATTACK definition of kerberoasting: "Portions of these tickets may be encrypted with the RC4 algorithm, meaning the Kerberos 5 TGS-REP etype 23 hash of the service account associated with the SPN is used as the private key and is thus vulnerable to offline Brute Force attacks that may expose plaintext credentials."
    This will result in windows log eid 4769 with encryption type 0x17.
    Is this the only time that this is dangerous? Only if this type of encryption was used?
    Working on a SIEM alarm to detect potential malicious kerberoasting :)

  • @adamraserovaquera
    @adamraserovaquera 4 місяці тому

    11:18 A question here, how can yo know that what etype you are searching for is the TGS-REP 23 and not lets say... the TGS-REP 18 that its at its side?

  • @matiashuartamendia7977
    @matiashuartamendia7977 9 місяців тому

    is it really NTLM hash inside the service account? I think that RC4 etype encrpytion of that password is equal to NTLM Hash, but AES-128 or AES-256 is completely different. Hashcat would take a LOT of time to decrypt it if password is strong enough.

  • @underrated_mono9770
    @underrated_mono9770 8 місяців тому

    If hostname of the SPN "DC-1" is replaced with another hostname, does it affect the Kerberoasting operation here?

  • @eanglyroeurn8255
    @eanglyroeurn8255 2 роки тому

    Bro Please help to create more video relate to AD attack, I knew that me and someone here will need that resource for OSCP fighting.

  • @DinoDulayAwil
    @DinoDulayAwil 2 роки тому

    Does the tool execution leave some footprint on the server for detection?

    • @DinoDulayAwil
      @DinoDulayAwil 2 роки тому

      I understand it requires a compromised account (normal account will do), can we use other abuse technique that does not require one? A different vector somehow. Thanks.

    • @c0nd4
      @c0nd4  2 роки тому +1

      The most common way I've seen this vector detected is from SPN enumeration. If you made a request to list all SPNs, some EDR programs may catch it.

  • @giovanniguarino588
    @giovanniguarino588 3 роки тому

    Thank you for your explaination, but this is a very little part of kerberoasting.

  • @redreacts2388
    @redreacts2388 Рік тому +1

    I'm taking a course right now that I paid for, but this was a far better explanation on how to exploit this vulnerability.....smh

  • @lmfao69420
    @lmfao69420 2 роки тому +1

    Let's go Brandon!