Kerberoasting is cracking the TGS to recover the service account password.

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Kerberoasting is cracking the TGS to recover the service account password.

Explanation:
Kerberos relies on a ticket that the Ticket Granting Service issues for access to a specific service (an SPN). After you obtain a TGT, you request a service ticket from the TGS for that SPN. That service ticket contains an encrypted portion that is protected by the service account’s password hash. An attacker can grab this ticket and perform offline cracking to recover the service account’s password. Because the attack targets the ticket issued by the TGS, it’s described as Kerberoasting cracking the TGS-derived ticket to reveal the service account password. The other items aren’t the focus: the TGT is an earlier credential, the service ticket is the same ticket produced by the TGS, and the Kerberos session key is a separate per-session key not the target of this password-cracking step.

Kerberos relies on a ticket that the Ticket Granting Service issues for access to a specific service (an SPN). After you obtain a TGT, you request a service ticket from the TGS for that SPN. That service ticket contains an encrypted portion that is protected by the service account’s password hash. An attacker can grab this ticket and perform offline cracking to recover the service account’s password. Because the attack targets the ticket issued by the TGS, it’s described as Kerberoasting cracking the TGS-derived ticket to reveal the service account password. The other items aren’t the focus: the TGT is an earlier credential, the service ticket is the same ticket produced by the TGS, and the Kerberos session key is a separate per-session key not the target of this password-cracking step.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy