Learn how to exploit a classic Active Directory misconfiguration to extract service tickets (TGS) and crack them offline to recover plain-text credentials.
This lab is essential for mastering post-compromise escalation via Kerberos SPN abuse. attack spn tgs ticket red team
- 1x Domain Controller (Windows Server 2019 or 2022)
- 1x Domain-joined Windows 10 machine (victim workstation)
- 1x Attacker machine (Kali Linux or Windows with Rubeus installed)
🧩 Domain: `rootdc.local`
🧑💼 Domain user: `hacker@rootdc.local` attack spn tgs ticket red team
3. Request a TGS ticket:
4. Export the ticket to file
5. Crack the hash:
6. Analyze the cracked credentials
7. Suggest mitigation:
- Use strong, complex passwords for service accounts
- Regularly rotate credentials for accounts with SPNs
- Avoid using standard user accounts for services
- Implement tiered admin model and log all TGS requests
- Monitor for abnormal Kerberos activity in SIEM