Request service tickets.
Crack offline.
Domain credentials are yours.
Target service accounts with weak passwords.
Kerberoasting is an attack technique that exploits the Kerberos authentication protocol in Active Directory. Attackers request service tickets (TGS) for accounts with Service Principal Names (SPNs), then crack the encrypted tickets offline to recover plaintext passwords.
Find service accounts with SPNs registered in Active Directory
Request service tickets encrypted with the service account's password hash
Export tickets from memory (no admin rights needed!)
Use Hashcat/John to crack the ticket and recover the password
Target: MSSQL_SVC // Objective: Kerberoast