Learn Active Directory Kerberoasting

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 54

  • @syxdev
    @syxdev Год назад +15

    This guy is unstoppable, never misses a video, so damn consistent,❤

  • @TehStoni
    @TehStoni Год назад +8

    as a CRTE and CARTP holder, im glad to see alteredsec sponsoring the video. hopefully we'll see the certs appear on more job posting.

  • @phillydee3592
    @phillydee3592 Год назад +2

    So by just getting a user on a domain you can get the TGT and TGS from the domain controller,cos it sees you as an authenticated user on the system..

  • @rationalbushcraft
    @rationalbushcraft Год назад +1

    Thanks. I have done kerberoasting before but never understood what I was doing at this level. Super cool stuff.

  • @KJC2025
    @KJC2025 Год назад +3

    Good stuff John. Thanks.

  • @robertdemoine5066
    @robertdemoine5066 Месяц назад

    first time i needed the subscribe and alarm bell button

  • @jcgm666
    @jcgm666 Год назад

    Great video man!

  • @burekhacks
    @burekhacks Год назад +18

    So this is why you've been asking twitter for the password? 😂

  • @federicoleonardi5421
    @federicoleonardi5421 7 месяцев назад

    Great job...greetings from italy

  • @nytr
    @nytr Год назад +3

    I still miss the honey badger video :(

    • @christophercahall3092
      @christophercahall3092 Год назад +1

      I was contemplating sending a secret message to kelly ripa on X saying that I learned that she was basically on soultrain from Questlove.

  • @josephalan31
    @josephalan31 Год назад

    Simply amazing!!!

  • @starlox0
    @starlox0 Год назад

    Awesome content 👏

  • @Tonib760
    @Tonib760 8 месяцев назад

    Any valid coupons for CRT? :)

  • @alimustafa2682
    @alimustafa2682 Год назад

    Finally man

  • @NamikageJoel19
    @NamikageJoel19 Год назад

    What windows server version did you use ?

  • @christianbally7507
    @christianbally7507 Год назад

    Question. When you are enumerating the SPNs are the ones that are vulnerable the user must have access to correct? So if the HTTP SPN was vulnerable but the user did not have access to it they would not be able to get that TGS right?

    • @BrownCoatFan
      @BrownCoatFan Год назад +1

      SPNs are not hidden. Everyone has access to them.

    • @christianbally7507
      @christianbally7507 Год назад

      I understand that. But not everyone has access to request the tgs correct? I.e sql server. Not everyone can get this ticket as only privileged accounts should be able to access it so the attacker would need to compromise this type of account. but if the compromised account was a normal user and requested the tgs wouldn’t it be not granted correct..?

    • @Nawdiral
      @Nawdiral Год назад +2

      Everyone can request a TGS, Domain Controller only provides Security Info about the user (PAC), it's up to the Service Account itself to check the user's rights in the TGS.
      The Security concern here is that DC use a piece of the secret of the requested service to encrypt the TGS which can be later used to brute force/crack the password.

  • @50PullUps
    @50PullUps Год назад +2

    So many of these attacks rely on already having domain admin or schema admin, or assume that the IT staff is hopelessly incompetent.

    • @BeWhoYouWant2
      @BeWhoYouWant2 Год назад +1

      They often are

    • @BrownCoatFan
      @BrownCoatFan Год назад +5

      No, domain admin and schema admin are not required for Kerberoasting. Those were just used to set up an SPN in AD so that he had something to attack. The actual Kerberoasting was just the last 2 minutes of the video.

    • @ancestrall794
      @ancestrall794 11 месяцев назад +1

      ​@@BrownCoatFanThanks

    • @TheSQL-Lover
      @TheSQL-Lover 8 месяцев назад

      And there are plenty of incompetent AD admins out there .

  • @GebzNotJebz
    @GebzNotJebz Год назад +14

    It's amazing how a 22 minute video about kerberoasting only has about 2 minutes worth of kerberoasting

  • @josephmensah2116
    @josephmensah2116 Год назад

    @hammond
    What OS do run on your baremetal ?

    • @seansingh4421
      @seansingh4421 Год назад

      Most likely either a MacOS or an SE Linux distro

  • @iblackfeathers
    @iblackfeathers Год назад

    thanks 👍

  • @Smoth48
    @Smoth48 Год назад +1

    That's crazy - how does a typical AD setup prevent this? Is there some other system/service in place that prevents you obtaining hashes in the first place, or is it more so a matter of good password strength policies so that something like John can't crack the hashes as easily?

    • @BrownCoatFan
      @BrownCoatFan Год назад

      Yes, use a very long (25 characters) and complex password.

    • @Nawdiral
      @Nawdiral Год назад +4

      Prefer GMSA if your App/System supports it. If not, a long, very complex password could help...

    • @brylozketrzyn
      @brylozketrzyn Год назад

      ​@@NawdiralgMSAs are so nice. Password lifetime of 24hrs and with length of 120chars. Also, they do not pretend to be user accounts.

  • @rouissi_iheb
    @rouissi_iheb Год назад

    🔥🔥🔥🔥🔥

  • @logiciananimal
    @logiciananimal Год назад

    It is a shame there's no easy way to snapshot an AD, no?

  • @fatherdani
    @fatherdani Год назад

    Use excalidraw next time 😂

  • @niffdjfm8345
    @niffdjfm8345 Год назад +1

    Alh4zr3d, is it you 🤨🤭😅🥳

  • @FieldBonnie-p9q
    @FieldBonnie-p9q 2 месяца назад

    Taylor Jose Lee Jeffrey Williams Timothy

  • @hoodietramp
    @hoodietramp Год назад

    😃 🚀 ❤️

  • @Tech69YT
    @Tech69YT Год назад +1

    first

    • @baxsm
      @baxsm Год назад +2

      👑 here's your crown

    • @Tech69YT
      @Tech69YT Год назад

      @@baxsmthanks bud

  • @nayzak69
    @nayzak69 Год назад +1

    Frist hehe

  • @CR7andJP
    @CR7andJP 3 месяца назад

    I like you, but this one was a weak video. The whole scripting thing is way too much to "learn Active Directory Kerberoasting".

  • @ololh4xx
    @ololh4xx Год назад

    i mean .... yeah; with domain admin privileges anything is possible. So? Thats like saying "root bad! root evil!". Yes. Yes, it is. Very. Much more than you can imagine. So?

    • @_JohnHammond
      @_JohnHammond  Год назад +4

      Kerberoasting is done from any low privilege domain user. We used the domain user account "Alice".

  • @zzsql
    @zzsql Год назад +5

    You know, talking this fast, you're not really teaching anything as much as blowing through content that isn't digestible by people.

  • @scottspa74
    @scottspa74 Год назад

    Every time I watch @johnhammond I just feel like an idiot, so unworthy 😞

  • @BeWhoYouWant2
    @BeWhoYouWant2 Год назад

    I actively despise AD and I don't even have a logical reason for it. just gut feeling.

  • @justethical280
    @justethical280 Год назад +2

    Pretty useless information if you have a minimum requirement of at least 13 characters with good complexity , a good EDR installed etc.....

  • @josephmensah2116
    @josephmensah2116 Год назад

    @hammond
    What OS do run on your baremetal ?

    • @dungphamvu3463
      @dungphamvu3463 Год назад

      If you mean OS running on his real machine then it's Windows 10