Steal or Forge Kerberos Tickets (T1558)
The Crown Jewels of Active Directory.
1. Kerberoasting
Targeting Service Accounts (SPNs).
- Theory: Any user can request a TGS (Ticket) for any service (e.g., SQL Server). This ticket is encrypted with the Service Account's NTLM hash.
- Attack:
- Request TGS for
MSSQLSvc/db.corp.local. - Take the ticket offline.
- Crack it (Brute-force) to recover the Service Account password.
- Request TGS for
- Tool: Rubeus or Impacket (
GetUserSPNs.py).
2. AS-REP Roasting
Targeting users with "Do not require Kerberos preauthentication" enabled.
- Theory: You can ask the KDC for a TGT for these users without knowing their password. The KDC sends back an encrypted chunk.
- Attack: Crack that chunk to get the user's password.
3. Golden Ticket (TGT Forgery)
If you have the krbtgt password hash (Domain Compromise), you create your own tickets.
- Power: Valid for 10 years, can be for any user (Administrator), works even if user changes password.
4. Silver Ticket (TGS Forgery)
If you have a Service Account hash (e.g., SQL), you can forge a ticket specifically for that service.
- Stealth: Does not communicate with the Domain Controller (KDC), so less logging.