@DebugPrivilege
DebugPrivilege
3 years
I was a bit bored, so decided to work on a blog post this weekend. It covers how to Kerberoast accounts, while trying to stay under the radar. I'll explain different OpSec failures as well.
11
103
341

Replies

@UK_Daniel_Card
mRr3b00t
3 years
@DebugPrivilege Iā€™d also suggest finding the actual service and seeing if it exists šŸ˜‚
1
0
1
@DebugPrivilege
DebugPrivilege
3 years
@UK_Daniel_Card I explained that in the blog sir.
1
0
2
@miketheitguy
Mike
3 years
@DebugPrivilege Thanks for this blog post :) Good stuff.
0
0
2
@techspence
spencer
3 years
@DebugPrivilege Nice work šŸ‘šŸ»
0
0
1
@NetsecSE
Netsec
3 years
@DebugPrivilege Clear and informative as usual from you. Now I'll have to go check if/how I detect these anti-detection techniques. :P
0
0
1
@hailnolly
Nolly
3 years
@DebugPrivilege Thank you for taking the time and effort to write this, Huy.
0
0
1
@fabio_viggiani
Fabio Viggiani
3 years
@DebugPrivilege Great post! Also, ".bro" TLDs should be a thing šŸ¤£
0
0
4
@SecBert
Bert de Jong
3 years
@DebugPrivilege Interesting post and an extra +1 for using George St-Pierre as a user :D.
0
0
1
@BlackMatter23
Vadim Khrykov
3 years
@DebugPrivilege Really nice recommendations for red teamers, now I know how to enhance our honey SPNs) I wouldn't bother about RC4, it normal for many services. In general what we see, pentesters behave quite noisy while performing kerberoasting.
0
1
4
@theBlazz3
Asahhh
3 years
@DebugPrivilege Great post, thanks!
0
0
0
@tim_johny
TIM JOHNY
3 years
0
0
0