The Kerberos protocol reduces your risk of reused and unsecure passwords, but can expose you to Kerberoasting attacks. Here’s what you need to know about this common attack technique.
Kerberoasting is an attack technique that targets the Kerberos — an authentication protocol that uses symmetric key cryptography and a key distribution center (KDC) to verify user identities.
Kerberoasting attacks start when an authenticated domain user requests a service ticket for a service principal name (SPN), which serves as a unique identifier.
The attacker extracts the service ticket, which is encrypted with the hash of the affiliated service account password. They then attempt to crack the plaintext password.
Kerberoasting attacks work by exploiting the ticket-granting ticket (TGT) authentication token issued by the KDC, which is used to request access tokens from the Kerberos ticket-granting service (TGS). Put simply: The Kerberos protocol lets you authenticate domain user accounts without having to ask people to constantly re-enter or store passwords — and attackers have specialized tools to exploit it. They do this by:
Attackers use Kerberoasting as a technique to obtain the hashed passwords of service accounts within a Microsoft Active Directory environment. By exploiting how Kerberos authentication works, attackers can extract these password hashes and attempt to crack them offline. Successfully cracking these hashes can grant attackers elevated privileges, enabling them to move laterally within the network, access sensitive data, or further compromise the system.
Here are the reasons why attackers use Kerberoasting:
To protect your organization against Kerberoasting attacks, early detection is key. In addition to monitoring for unusual Kerberos traffic patterns and ticket requests, use behavior-based detections to identify anomalies in the actual requests.
Vectra AI provides two types of Kerberoasting detections:
The Account Scan detection identifies attempts to query the Kerberos authentication service for valid user accounts — a common precursor to Kerberoasting.