Q1: Analyzing Domain Controller Security Logs

Can you confirm the date and time when the Kerberoasting activity occurred?

Open Event Viewer on the Windows VM and search for Event ID 4769.

đź•’ Remember to convert your local time to UTC.

Kerberoasting Event


Q2: Targeted Service Name

What is the Service Name that was targeted?

Check the “Service Information” section of the same event:

Service Name


Q3: Workstation Identification

Identify the Workstation IP Address from which the activity originated.

In the same event, look under Network Information → Client Address:

Client Address: 172.17.79.129


Q4: Script Enumeration for Kerberoastable Accounts

Now that we have the workstation, review the provided PowerShell logs and Prefetch files to understand how this activity occurred. We’re looking for the file used to enumerate Active Directory objects and find Kerberoastable accounts.

Search using Event ID 4104.

Enumeration Script File


Q5: Script Execution Time

When was this script executed?

Refer again to Event ID 4104, and convert the timestamp to UTC.

đź•’ Execution Time (UTC): 2024-05-21 03:16:32


Q6: Kerberoasting Tool Path

Determine the full path of the tool used to perform the actual Kerberoasting attack.

Use PECmd for Prefetch analysis.

PECmd Output

Then, open the exported timeline .csv using Timeline Explorer.

Timeline Explorer


Q7: Tool Execution Time

When was the tool executed to dump credentials?

You can find this information in the previous screenshot (Prefetch timeline CSV output).