module

Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)

Disclosed
Sep 27, 2014
Created
Jun 14, 2018

Description

This module will try to find Service Principal Names that are associated with normal user accounts.
Since normal accounts' passwords tend to be shorter than machine accounts, and knowing that a TGS request
will encrypt the ticket with the account the SPN is running under, this could be used for an offline
bruteforcing attack of the SPNs account NTLM hash if we can gather valid TGS for those SPNs.
This is part of the kerberoast attack research by Tim Medin (@timmedin).

Authors

Alberto Solino
Jacob Robles

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/get_user_spns
msf auxiliary(get_user_spns) > show actions
...actions...
msf auxiliary(get_user_spns) > set ACTION < action-name >
msf auxiliary(get_user_spns) > show options
...show and set options...
msf auxiliary(get_user_spns) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.