|
18645 | 18645 | "autofilter_ports": [], |
18646 | 18646 | "autofilter_services": [], |
18647 | 18647 | "targets": null, |
18648 | | - "mod_time": "2024-07-23 09:56:40 +0000", |
| 18648 | + "mod_time": "2025-05-13 11:21:04 +0000", |
18649 | 18649 | "path": "/modules/auxiliary/gather/asrep.rb", |
18650 | 18650 | "is_install_path": true, |
18651 | 18651 | "ref_name": "gather/asrep", |
|
20557 | 20557 | "needs_cleanup": false, |
20558 | 20558 | "actions": [] |
20559 | 20559 | }, |
20560 | | - "auxiliary_gather/get_user_spns": { |
20561 | | - "name": "Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)", |
20562 | | - "fullname": "auxiliary/gather/get_user_spns", |
20563 | | - "aliases": [], |
20564 | | - "rank": 300, |
20565 | | - "disclosure_date": "2014-09-27", |
20566 | | - "type": "auxiliary", |
20567 | | - "author": [ |
20568 | | - "Alberto Solino", |
20569 | | - "Jacob Robles" |
20570 | | - ], |
20571 | | - "description": "This module will try to find Service Principal Names that are associated with normal user accounts.\n Since normal accounts' passwords tend to be shorter than machine accounts, and knowing that a TGS request\n will encrypt the ticket with the account the SPN is running under, this could be used for an offline\n bruteforcing attack of the SPNs account NTLM hash if we can gather valid TGS for those SPNs.\n This is part of the kerberoast attack research by Tim Medin (@timmedin).", |
20572 | | - "references": [ |
20573 | | - "URL-https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py", |
20574 | | - "URL-https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Dog%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-%20Tim%20Medin(1).pdf" |
20575 | | - ], |
20576 | | - "platform": "", |
20577 | | - "arch": "", |
20578 | | - "rport": null, |
20579 | | - "autofilter_ports": [], |
20580 | | - "autofilter_services": [], |
20581 | | - "targets": null, |
20582 | | - "mod_time": "2023-01-17 18:59:12 +0000", |
20583 | | - "path": "/modules/auxiliary/gather/get_user_spns.py", |
20584 | | - "is_install_path": true, |
20585 | | - "ref_name": "gather/get_user_spns", |
20586 | | - "check": false, |
20587 | | - "post_auth": true, |
20588 | | - "default_credential": false, |
20589 | | - "notes": { |
20590 | | - "AKA": [ |
20591 | | - "GetUserSPNs.py", |
20592 | | - "Kerberoast" |
20593 | | - ] |
20594 | | - }, |
20595 | | - "session_types": false, |
20596 | | - "needs_cleanup": false, |
20597 | | - "actions": [] |
20598 | | - }, |
20599 | 20560 | "auxiliary_gather/gitlab_authenticated_subgroups_file_read": { |
20600 | 20561 | "name": "GitLab Authenticated File Read", |
20601 | 20562 | "fullname": "auxiliary/gather/gitlab_authenticated_subgroups_file_read", |
|
21855 | 21816 | "needs_cleanup": false, |
21856 | 21817 | "actions": [] |
21857 | 21818 | }, |
| 21819 | + "auxiliary_gather/kerberoast": { |
| 21820 | + "name": "Gather Ticket Granting Service (TGS) tickets for User Service Principal Names (SPN)", |
| 21821 | + "fullname": "auxiliary/gather/kerberoast", |
| 21822 | + "aliases": [ |
| 21823 | + "auxiliary/gather/get_user_spns" |
| 21824 | + ], |
| 21825 | + "rank": 300, |
| 21826 | + "disclosure_date": null, |
| 21827 | + "type": "auxiliary", |
| 21828 | + "author": [ |
| 21829 | + "Alberto Solino", |
| 21830 | + "smashery" |
| 21831 | + ], |
| 21832 | + "description": "This module will try to find Service Principal Names that are associated with normal user accounts.\n Since normal accounts' passwords tend to be shorter than machine accounts, and knowing that a TGS request\n will encrypt the ticket with the account the SPN is running under, this could be used for an offline\n bruteforcing attack of the SPNs account NTLM hash if we can gather valid TGS for those SPNs.\n This is part of the kerberoast attack research by Tim Medin (@timmedin).", |
| 21833 | + "references": [ |
| 21834 | + "URL-https://github.com/CoreSecurity/impacket/blob/master/examples/GetUserSPNs.py" |
| 21835 | + ], |
| 21836 | + "platform": "", |
| 21837 | + "arch": "", |
| 21838 | + "rport": 389, |
| 21839 | + "autofilter_ports": [], |
| 21840 | + "autofilter_services": [], |
| 21841 | + "targets": null, |
| 21842 | + "mod_time": "2025-05-15 13:39:10 +0000", |
| 21843 | + "path": "/modules/auxiliary/gather/kerberoast.rb", |
| 21844 | + "is_install_path": true, |
| 21845 | + "ref_name": "gather/kerberoast", |
| 21846 | + "check": false, |
| 21847 | + "post_auth": false, |
| 21848 | + "default_credential": false, |
| 21849 | + "notes": { |
| 21850 | + "Stability": [ |
| 21851 | + "crash-safe" |
| 21852 | + ], |
| 21853 | + "SideEffects": [ |
| 21854 | + "ioc-in-logs" |
| 21855 | + ], |
| 21856 | + "Reliability": [], |
| 21857 | + "AKA": [ |
| 21858 | + "GetUserSpns.py", |
| 21859 | + "get_user_spns" |
| 21860 | + ] |
| 21861 | + }, |
| 21862 | + "session_types": [ |
| 21863 | + "ldap" |
| 21864 | + ], |
| 21865 | + "needs_cleanup": false, |
| 21866 | + "actions": [] |
| 21867 | + }, |
21858 | 21868 | "auxiliary_gather/kerberos_enumusers": { |
21859 | 21869 | "name": "Kerberos Domain User Enumeration", |
21860 | 21870 | "fullname": "auxiliary/gather/kerberos_enumusers", |
|
0 commit comments