Kerberoasting: SPN Sweep is a detection focused on identifying attempts to enumerate Service Principal Names (SPNs) within an Active Directory environment. Attackers use SPN sweeps to gather information about service accounts that can be targeted for Kerberoasting attacks. By requesting SPNs, attackers can obtain service account ticket-granting service (TGS) tickets, which can be brute-forced offline to reveal plaintext passwords.
An attacker uses a compromised user account to perform an SPN sweep. The attacker retrieves a list of service accounts and their associated SPNs. Using a tool like Rubeus, the attacker requests TGS tickets for these accounts and then proceeds to brute-force the tickets offline to obtain the plaintext passwords.
During a penetration test, the security team runs a script to enumerate SPNs to identify potential targets for Kerberoasting. The detection is triggered, and the security team verifies the activity as part of the assessment.
If this detection indicates a genuine threat, the organization faces significant risks:
Attackers can obtain plaintext passwords of service accounts, which may have elevated privileges.
Compromised credentials can be used to move laterally within the network, escalating privileges.
Access to sensitive data and resources, leading to potential data exfiltration.