Kerberos Attacks in Windows Active Directory | TryHackMe Attacking Kerberos
We covered the solution walkthrough for TryHackMe Attacking Kerberos room where we focused on Kerberos attacks such as Kerberoasting, AS-REP Roasting, Pass the Ticket and Golden/Silver Ticket Attacks within Windows Active Directory.
Please watch the video at the bottom for full detailed explanation of the walkthrough.
Definition of Kerberos
Kerberos is the default authentication service for Microsoft Windows domains. It is intended to be more “secure” than NTLM by using third party ticket authorization as well as stronger encryption. Even though NTLM has a lot more attack vectors to choose from Kerberos still has a handful of underlying vulnerabilities just like NTLM that we can use to our advantage.
Common Definitions
Kerberos Authentication
AS-REQ — 1.) The client requests an Authentication Ticket or Ticket Granting Ticket (TGT).
AS-REP — 2.) The Key Distribution Center verifies the client and sends back an encrypted TGT.
TGS-REQ — 3.) The client sends the encrypted TGT to the Ticket Granting Server (TGS) with the Service Principal Name (SPN) of the service the client wants to access.
TGS-REP — 4.) The Key Distribution Center (KDC) verifies the TGT of the user and that the user has access to the service, then sends a valid session key for the service to the client.
AP-REQ — 5.) The client requests the service and sends the valid session key to prove the user has access.
AP-REP — 6.) The service grants access Interact with IOCs and how the adversaries operationalize.
领英推荐
Using Rubeus to Harvest Kerberos Tickets & Perform Password Spraying
Rubeus has a wide variety of attacks and features that allow it to be a very versatile tool for attacking Kerberos. Just some of the many tools and attacks include overpass the hash, ticket requests and renewals, ticket management, ticket extraction, harvesting, pass the ticket, AS-REP Roasting, and Kerberoasting.
The below command tells Rubeus to harvest for TGTs every 30 seconds
Rubeus.exe harvest /interval:30
The below command will take a given password and “spray” it against all found users then give the .kirbi TGT for that user
Rubeus.exe brute /password:Password1 /noticket
Definition of Kerberoasting
Kerberoasting is an attack that targets service accounts in AD to escalate privileges.
Kerberoasting allows a user to request a service ticket for any service with a registered SPN then use that ticket to crack the service password. If the service has a registered SPN then it can be Kerberoastable however the success of the attack depends on how strong the password is and if it is trackable as well as the privileges of the cracked service account.
Definition of ASREP Roasting
ASREP Roasting is a type of attack that involves an attacker impersonating an authentication request (requesting a ticket for the target user) for a user that has Kerberos pre-authentication feature not enabled or configured. Pre-authentication requires the client to prove its identity before the Kerberos Key Distribution Center will issue a ticket.
Room Answers | TryHackMe Attacking Kerberos
Room answers can be found here.
Video Walkthrough | TryHackMe Attacking Kerberos
Predicted Action = β? + β? * T(n)Thoughts + β? * EMF <-T(1)(Thoughts) = Heath + Information_Flow + Upbrining. Trans Worker.
2 个月Okay, lets see if I can run through this myself before trying another one with Zac. A good warmup.