Kerberoasting Attack Chain
Kerberoasting remains one of the most reliable privilege-escalation primitives in modern Active Directory. This research walks the full attack chain — from minimal domain access to crackable service-account hashes — and pairs each step with the detection opportunity defenders should be wiring up.
Overview
Kerberoasting abuses a legitimate Kerberos design
decision: any authenticated user can request a
service ticket (TGS) for any account with a
registered servicePrincipalName. The
returned TGS is encrypted with the service account's
NTLM hash, allowing offline brute-force against the
password without ever interacting with the account
directly.
Attack Chain
- Foothold: any low-privileged domain user account.
- SPN discovery: enumerate accounts with SPNs via LDAP or PowerView.
- Ticket request: request TGS tickets for high-value SPNs.
- Extraction: dump tickets in Hashcat-compatible format.
- Cracking: offline brute-force with rule-based attacks.
- Pivot: use cracked credentials for lateral or vertical movement.
Representative tooling — Impacket from a Linux pivot:
impacket-GetUserSPNs -request \
-dc-ip <dc-ip> \
<domain>/<user>:<password>
And cracking with Hashcat:
hashcat -m 13100 -a 0 hashes.txt rockyou.txt -r rules/best64.rule
Detection Telemetry
- Event ID 4769 on domain controllers — focus on RC4-HMAC tickets (encryption type
0x17) and unusualServiceNamepatterns. - Single source workstation requesting many distinct service tickets in a short window.
- Service tickets requested for high-value SPNs by accounts with no business need.
- Honey SPN accounts wired straight to high-fidelity alerts.
Hardening Recommendations
- Force AES-only encryption on service accounts (
msDS-SupportedEncryptionTypes) — eliminates the RC4-HMAC fast path. - Use group Managed Service Accounts (gMSA) wherever possible — passwords are 240-character random and rotated automatically.
- Audit and remove unnecessary SPNs.
- Enforce strong, unique passwords (≥25 chars) on remaining service accounts.
- Deploy honey SPNs and tune the SIEM detections above to high fidelity.