Due to the operation of the Kerberos service it is possible to extract krbtgs hashes of users within the domain.
Obtain users hashes.
Configure a logger to alert Kerberoast attacks.
Unauthorized domain user with valid credentials in the internal network.
⌚ 120 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The service should have a defined security group id, that allows a logger to be activated in case of an attack
Properties:
GroupDescription: Domain Controllers Security Group
VpcId: !Ref VPCID
SecurityGroupIngress:
- IpProtocol: tcp
Description: Kerberos
FromPort: 88
ToPort: 88
SourceSecurityGroupId: !Ref AdminMembersSG
A Kerberoast service uses the default security group configuration
Properties:
GroupDescription: Domain Controllers Security Group
VpcId: !Ref VPCID
SecurityGroupIngress:
- IpProtocol: tcp
Description: Kerberos
FromPort: 88
ToPort: 88
SourceSecurityGroupId: Allow