Skip to content

Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ž๐—ฒ๐—ฟ๐—•๐—น๐—ถ๐˜๐˜‡ implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.

License

Notifications You must be signed in to change notification settings

byt3n33dl3/CracKerBlitz

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

68 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

_________                       ____  __.          __________.__  .__  __          
\_   ___ \____________    ____ |    |/ _|__________\______   \  | |__|/  |_________
/    \  \/\_  __ \__  \ _/ ___\|      <_/ __ \_  __ \    |  _/  | |  \   __\___   /
\     \____|  | \// __ \\  \___|    |  \  ___/|  | \/    |   \  |_|  ||  |  /    / 
 \______  /|__|  (____  /\___  >____|__ \___  >__|  |______  /____/__||__| /_____ \
        \/            \/     \/        \/   \/             \/                    \/
v2

C R A C K E R B L I T Z

CracKerBlitz for roasting, Bellaros for ( lib )

Abusive and aggressive ( Kerberos ) attack

Opsec Notes

This section covers some notes on the operational security of using Bellaros in an environment, with some technical examples comparing/contrasting some of its approaches. The material here will be expanded in the future.

thanks to ( Rubeus ) and several roasting scripts.

About

Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ž๐—ฒ๐—ฟ๐—•๐—น๐—ถ๐˜๐˜‡ implements many parts of the normal Kerberos protocol, the main detection method involves the use of rc4_hmac in Kerberos exchanges.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •