Kerberos Flashcards

(5 cards)

1
Q

Explain Kerberoasting and its implications.

A

Kerberoasting involves an authenticated user requesting a Service Ticket (TGS) for an account with an SPN. Since the ticket is encrypted with the service account’s hash, it can be cracked offline. It allows for stealthy privilege escalation without direct service interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Kerberoasting exploit Kerberos protocol design?

A

It exploits the fact that the KDC does not check if a user has permission to a service before issuing a TGS. By requesting tickets encrypted with NTLM or RC4_HMAC, attackers can perform high-speed offline brute-forcing against the account password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main components of the Kerberos protocol?

A

Kerberos uses a Key Distribution Center (KDC) consisting of the Authentication Service (AS) for TGT issuance and the Ticket Granting Service (TGS) for service ticket issuance. It relies on a trusted third-party model to authenticate clients to servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the best practices for defending against Kerberoasting?

A

Key defenses include using Group Managed Service Accounts (gMSAs) for uncrackable passwords, creating ‘Honey-SPNs’ to trigger alerts upon access, and monitoring Event ID 4769 for unusual ticket requests or weak RC4 encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can Red Teams benefit from DNS rebinding attacks?

A

DNS rebinding bypasses the Same-Origin Policy (SOP) by flipping a DNS record from an attacker IP to an internal IP (like 127.0.0.1). This allows a victim’s browser to be used as a proxy to attack internal, unauthenticated APIs like Jenkins or Docker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly