Kerberoasting
Making the Lab
Set up general ad lab.
Add in a new user called SQLService
Open a cmd on the DC and use:
You can then verify that the spn can be found:
Abuse
Rubeus is simplest way:
Hashcat to crack the hash:
Fixing
Could remove SPN from account but would break things.
Real fix is to use a strong password for the service account. This could be changed by:
Last updated