Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-509:Kerberoasting
Attack Pattern ID:509
Version:v3.9
Attack Pattern Name:Kerberoasting
Abstraction:Detailed
Status:Stable
Likelihood of Attack:
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
Through the exploitation of how service accounts leverage Kerberos authentication with Service Principal Names (SPNs), the adversary obtains and subsequently cracks the hashed credentials of a service account target to exploit its privileges. The Kerberos authentication protocol centers around a ticketing system which is used to request/grant access to services and to then access the requested services. As an authenticated user, the adversary may request Active Directory and obtain a service ticket with portions encrypted via RC4 with the private key of the authenticated account. By extracting the local ticket and saving it disk, the adversary can brute force the hashed value to reveal the target account credentials.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfS652Use of Known Kerberos Credentials
CanPrecedeM151Identity Spoofing
Nature: ChildOf
Type: Standard
ID: 652
Name: Use of Known Kerberos Credentials
Nature: CanPrecede
Type: Meta
ID: 151
Name: Identity Spoofing
▼Execution Flow
Experiment
1.

Extract ticket and save to disk

Extract ticket and save to disk

Technique
Certain tools like Mimikatz can extract local tickets and save them to memory/disk.
Explore
1.

Scan for user accounts with set SPN values

Scan for user accounts with set SPN values

Technique
These can be found via Powershell or LDAP queries, as well as enumerating startup name accounts and other means.
2.

Request service tickets

Request service tickets

Technique
Using user account's SPN value, request other service tickets from Active Directory
Exploit
1.

Crack the encrypted ticket to harvest plain text credentials

Crack the encrypted ticket to harvest plain text credentials

Technique
Leverage a brute force application/script on the hashed value offline until cracked. The shorter the password, the easier it is to crack.
▼Prerequisites
The adversary requires access as an authenticated user on the system. This attack pattern relates to elevating privileges.
The adversary requires use of a third-party credential harvesting tool (e.g., Mimikatz).
The adversary requires a brute force tool.
▼Skills Required
Medium

▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
ConfidentialityN/AGain PrivilegesN/A
Scope: Confidentiality
Likelihood: N/A
Impact: Gain Privileges
Note: N/A
▼Mitigations
Monitor system and domain logs for abnormal access.
Employ a robust password policy for service accounts. Passwords should be of adequate length and complexity, and they should expire after a period of time.
Employ the principle of least privilege: limit service accounts privileges to what is required for functionality and no more.
Enable AES Kerberos encryption (or another stronger encryption algorithm), rather than RC4, where possible.
▼Example Instances
▼Related Weaknesses
IDName
CWE-262Not Using Password Aging
CWE-263Password Aging with Long Expiration
CWE-294Authentication Bypass by Capture-replay
CWE-308Use of Single-factor Authentication
CWE-309Use of Password System for Primary Authentication
CWE-521Weak Password Requirements
CWE-522Insufficiently Protected Credentials
ID: CWE-262
Name: Not Using Password Aging
ID: CWE-263
Name: Password Aging with Long Expiration
ID: CWE-294
Name: Authentication Bypass by Capture-replay
ID: CWE-308
Name: Use of Single-factor Authentication
ID: CWE-309
Name: Use of Password System for Primary Authentication
ID: CWE-521
Name: Weak Password Requirements
ID: CWE-522
Name: Insufficiently Protected Credentials
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1558.003Steal or Forge Kerberos Tickets:Kerberoasting
Taxonomy Name: ATTACK
Entry ID: 1558.003
Entry Name: Steal or Forge Kerberos Tickets:Kerberoasting
▼Notes
▼References
Reference ID: REF-559
Title: Extracting Service Account Passwords with Kerberoasting
Author: Jeff Warren
Publication:
Publisher:
Edition:
URL:https://blog.stealthbits.com/extracting-service-account-passwords-with-kerberoasting/
URL Date:
Day:09
Month:05
Year:2017
Reference ID: REF-585
Title: Kerberoasting Without Mimikatz
Author:
Publication:
Publisher:
Edition:
URL:https://www.harmj0y.net/blog/powershell/kerberoasting-without-mimikatz/
URL Date:2020-05-15
Day:01
Month:11
Year:2016
Reference ID: REF-586
Title: Invoke-Kerberoast
Author:
Publication:
Publisher:
Edition:
URL:https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/
URL Date:2020-05-15
Day:N/A
Month:N/A
Year:N/A
Details not found