Kerberoast attack toolkit -pure python
Install
pip3 install kerberoast
Prerequirements
Python 3.6 See requirements.txt
IMPORTANT: the accepted target url formats for LDAP and Kerberos are the following<ldap_connection_url> : <protocol>+<auth-type>://<domain>\<user>:<password>@<ip_or_hostname>/?<param1>=<value1><kerberos_connection_url>: <protocol>+<auth-type>://<domain>\<user>:<password>@<ip_or_hostname>/?<param1>=<value1>
Steps -with SSPI-: kerberoast auto <DC_ip>
Steps -SSPI not used-:
kerberoast ldap all <ldap_connection_url> -o ldapenumldapenum_asrep_users.txt filekerberoast asreproast <DC_ip> -t ldapenum_asrep_users.txtldapenum_spn_users.txt filekerberoast spnroast <kerberos_connection_url> -t ldapenum_spn_users.txtThis command group is for enumerating potentially vulnerable users via LDAP.
kerberoast ldap <type> <ldap_connection_url> <options>
Type: It supports three types of users to be enumerated
spn Enumerates users with servicePrincipalName attribute set.asrep Enumerates users with DONT_REQ_PREAUTH flag set in their UAC attribute.all Startes all the above mentioned enumerations.ldap_connection_url: Specifies the usercredential and the target server in the msldap url format (see help)
options:
-o: Output file base name
This command is to perform username enumeration by brute-forcing the kerberos service with possible username candidates
kerberoast brute <realm> <dc_ip> <targets> <options>
realm: The kerberos realm usually looks like COMPANY.corpdc_ip: IP or hostname of the domain controllertargets: Path to the file which contains the possible username candidatesoptions:
-o: Output file base name
This command is to perform ASREProast attack
kerberoast asreproast <dc_ip> <options>
dc_ip: IP or hostname of the domain controlleroptions:
-r: Specifies the kerberos realm to be used. It overrides all other realm info.
-o: Output file base name
-t: Path to the file which contains the usernames to perform the attack on
-u: Specifies the user to perform the attack on. Format is either <username> or <username>@<realm> but in the first case, the -r option must be used to specify the realm
This command is to perform SPNroast (AKA kerberoast) attack.
kerberoast spnroast <kerberos_connection_url> <options>
kerberos_connection_url: Specifies the usercredential and the target server in the kerberos URL format (see help)
options:
-r: Specifies the kerberos realm to be used. It overrides all other realm info.
-o: Output file base name
-t: Path to the file which contains the usernames to perform the attack on
-u: Specifies the user to perform the attack on. Format is either <username> or <username>@<realm> but in the first case, the -r option must be used to specify the realm
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…