Overview
Perform Kerberos-based password bruteforce attacks against domain accounts. This technique leverages Kerberos pre-authentication to test passwords without triggering traditional account lockout mechanisms in many configurations.Syntax
Targeting Options
Single password to test against multiple users
File containing list of passwords to test
Single username to test against multiple passwords
File containing list of usernames to test
Optional Parameters
Target domain (default: current domain)
Domain controller to target
Output successful credentials to file
Don’t request TGT for valid credentials
Show failed authentication attempts
Examples
Attack Strategies
Password Spraying
Password Spraying
Low and Slow:
- Test common passwords against many accounts
- Avoid account lockout by testing few passwords
- Focus on seasonal/company-specific passwords
- Password123!, Welcome123!, Summer2024!
- Company name variations
- Season + year combinations
- Default passwords (admin, password, etc.)
Targeted Bruteforce
Targeted Bruteforce
High-Value Accounts:
- Focus on administrative accounts
- Service accounts with predictable passwords
- Accounts with known password patterns
- Use OSINT for password hints
- Company-specific terminology
- Personal information from social media
Evasion and OpSec
Account Lockout Avoidance
Account Lockout Avoidance
Lockout Policy Awareness:
- Understand domain lockout thresholds
- Stay below lockout attempt limits
- Implement delays between attempts
- Test 1-2 passwords per account per day
- Distribute attempts across time
- Use multiple source IPs if possible
Detection Avoidance
Detection Avoidance
Timing Strategies:
- Perform during business hours
- Mimic normal authentication patterns
- Implement random delays
- Limit total authentication attempts
- Rotate target accounts
- Monitor for defensive responses
Related Commands
preauthscan- Find accounts without pre-authasktgt- Use discovered credentialsasreproast- Alternative credential attack