What is Kerberoasting?

by | Jun 1, 2025 | Exploits, Penetration Testing, Research





Dark-mode flowchart illustrating the Kerberoasting attack process, showing five glowing steps: Domain User, SPN Request, Service Ticket, Offline Cracking, and Privileged Access, over a cyber-themed circuit background.





Stylized digital illustration of two terminal windows side by side on a dark cyber-themed background. The left window labeled 'Windows Environment' displays simulated service ticket data, while the right window labeled 'Linux Environment' shows mock SPN and hash values, representing Kerberoasting tools in Windows and Linux environments.



Stylized penetration test report showing a cracked service account labeled 'sql-backup,' a high risk level warning, and suggested remediation steps including password change and AES encryption enforcement, displayed on a dark digital background.



📧 contact@artificesecurity.com
📞 720-515-1337
🔗 artificesecurity.com



What is Kerberoasting in cybersecurity?

Kerberoasting is a technique where attackers request encrypted service tickets from Active Directory using a normal user account. These tickets can be taken offline and cracked to reveal the passwords of service accounts. If those accounts have elevated privileges, attackers can use them to access sensitive systems.

Can Kerberoasting be detected?

Yes, but it requires specific monitoring. You need to log and analyze Kerberos ticket requests, especially Event ID 4769. Unusual patterns, like a regular user account requesting multiple service tickets in a short time, may signal Kerberoasting activity. Most environments do not alert on this by default.

How do pentesters simulate Kerberoasting?

Penetration testers use tools like GetUserSPNs.py from the Impacket framework or the Metasploit module get_user_spns to request service tickets. They then try to crack those tickets offline using tools like Hashcat. If successful, they use the cracked credentials to test lateral movement and privilege escalation, just like a real attacker would.

What are the best defenses against Kerberoasting?

The most effective defenses include enforcing strong passwords for all service accounts, switching to AES-only encryption, using Group Managed Service Accounts (gMSAs), and reducing unnecessary privileges. Monitoring for unusual Kerberos activity is also essential for early detection.

Have any questions?

Fill out the form below

Leading-Edge Penetration Testing

Services