<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Kerberoast on Mike.Horn</title>
    <link>https://mikehorn-git.github.io/tags/kerberoast/</link>
    <description>Recent content in Kerberoast on Mike.Horn</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Sun, 22 Sep 2024 00:00:00 +0200</lastBuildDate>
    <atom:link href="https://mikehorn-git.github.io/tags/kerberoast/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>campfire-1</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-1/</guid>
      <description>&lt;h1 id=&#34;q1-analyzing-domain-controller-security-logs&#34;&gt;Q1: Analyzing Domain Controller Security Logs&lt;/h1&gt;
&lt;p&gt;Can you confirm the &lt;strong&gt;date and time&lt;/strong&gt; when the &lt;em&gt;Kerberoasting&lt;/em&gt; activity occurred?&lt;/p&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4769&#34;&gt;4769&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert your local time to &lt;strong&gt;UTC&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;img alt=&#34;Kerberoasting Event&#34; loading=&#34;lazy&#34; src=&#34;../../writeups/htb/sherlocks/campfire-1/2024-09-21T16_52_20,152679715+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-targeted-service-name&#34;&gt;Q2: Targeted Service Name&lt;/h1&gt;
&lt;p&gt;What is the &lt;strong&gt;Service Name&lt;/strong&gt; that was targeted?&lt;/p&gt;
&lt;p&gt;Check the &amp;ldquo;Service Information&amp;rdquo; section of the same event:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Service Name&#34; loading=&#34;lazy&#34; src=&#34;../../writeups/htb/sherlocks/campfire-1/2024-09-21T16_58_06,480108177+02_00.png&#34;&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q3-workstation-identification&#34;&gt;Q3: Workstation Identification&lt;/h1&gt;
&lt;p&gt;Identify the &lt;strong&gt;Workstation IP Address&lt;/strong&gt; from which the activity originated.&lt;/p&gt;</description>
    </item>
    <item>
      <title>campfire-2</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</link>
      <pubDate>Sun, 22 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/campfire-2/</guid>
      <description>&lt;h1 id=&#34;q1-when-did-the-as-rep-roasting-attack-occur-and-when-did-the-attacker-request-the-kerberos-ticket-for-the-vulnerable-user&#34;&gt;Q1: When did the &lt;em&gt;AS-REP Roasting&lt;/em&gt; attack occur, and when did the attacker request the Kerberos ticket for the vulnerable user?&lt;/h1&gt;
&lt;p&gt;Open &lt;strong&gt;Event Viewer&lt;/strong&gt; on the Windows VM and search for &lt;strong&gt;Event ID &lt;a href=&#34;https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768&#34;&gt;4768&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Look for anomalies in the logs — specifically events where:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Pre-Authentication Type:&lt;/strong&gt; &lt;code&gt;0&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This indicates that the account does not require Kerberos pre-authentication, making it vulnerable to &lt;em&gt;AS-REP Roasting&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;ASREP Event&#34; loading=&#34;lazy&#34; src=&#34;../../writeups/htb/sherlocks/campfire-2/2024-09-21T18:18:55,910252335+02:00.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🕒 Remember to convert the timestamp to &lt;strong&gt;UTC&lt;/strong&gt; when documenting your findings.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
