.. / AD - Rubeus - Kerberoast

Rubeus’ kerberoast module will attempt to fetch Service Principal Names that are associated with normal user accounts. What is returned is a ticket that is encrypted with the user account’s password, which can then be bruteforced offline. The following command is run on a Windows machine in the victim domain.

Command Reference:

Output File: hashes.txt
Command: Copy References:

https://github.com/GhostPack/Rubeus

https://github.com/GhostPack/Rubeus#kerberoast