All Events and Webinars

Hacking Through Kerberoasting Webinar

Cross Industry
Identity and Access
Threat Actors and Campaigns
Vulnerabilities and Exposure
Cloud and Infrastructure
March 26, 2024
Active Directory attacks don’t require zero-days, just weak configurations and poor credential hygiene. This live session demonstrates how attackers exploit Kerberos through techniques like AS-REP roasting and Kerberoasting to gain privileged access. Viewers will learn how these attacks work in practice and what controls, monitoring, and account management steps can stop them early.

In-House Specialists

Arkadiusz Marta

Team Leader & Senior Penetration Tester

External Speakers

No external speakers for this session.

Key Strategic Takeaways

Is Kerberos Secure by Design but Fragile in Practice?

Kerberos underpins authentication in Active Directory, using ticket-based access (TGT and TGS) to avoid repeatedly exposing passwords. In theory, it’s a strong model, but in real environments, weak configurations and poor credential hygiene turn it into an attack vector. The problem isn’t Kerberos itself, it’s how identities and secrets are managed around it.

Does Kerberoasting Turn Authentication Into an Offline Attack?

Kerberoasting allows attackers with basic access to request service tickets tied to service accounts and then crack them offline. This bypasses traditional detection because the attack happens outside the network once the ticket is obtained. Security shifts from “can we detect it” to “how strong is the password,” which is where most organisations quietly fail.

Are Service Accounts a Hidden Weak Point?

Service accounts are often over-privileged, poorly managed, and rarely rotated, making them ideal targets for escalation. In many environments, compromising a single service account can lead directly to domain-level access. Treating service accounts as critical assets, with strict privilege control and automated credential management, is essential to breaking this attack chain.

Can Simple Misconfigurations Still Enable Full Domain Compromise?

Techniques like AS-REP roasting require minimal effort, sometimes just a username, if Kerberos pre-authentication is disabled. Combined with weak passwords and exposed data, attackers can move from initial access to full domain compromise in a short time. Eliminating legacy settings, enforcing strong authentication controls, and reducing exposed credentials closes off these low-effort entry points.

Does Detection Depend on Visibility Into Identity Behaviour?

Kerberoasting activity can be detected through abnormal patterns in Kerberos ticket requests, particularly spikes targeting high-value accounts. However, this requires proper logging, monitoring, and correlation across identity events. Without visibility into authentication behaviour, these attacks blend into normal activity until it’s too late.

No items found.
  • 00:00 Introduction to the live hacking session on Active Directory attacks
  • 03:17 Kerberos basics and why it matters in Windows domain environments
  • 06:53 Kerberos authentication flow: TGTs, TGSs, and ticket-based access
  • 10:52 AS-REP roasting explained and why disabled pre-auth is dangerous
  • 13:17 Kerberoasting explained and how service accounts become targets
  • 16:45 Lab setup and initial enumeration of the domain controller
  • 18:03 Finding anonymous SMB access and extracting exposed user information
  • 21:40 Validating usernames and launching the AS-REP roasting attack
  • 24:50 Cracking Kerberos hashes offline to recover weak passwords
  • 27:02 Using BloodHound to map high-value Active Directory relationships
  • 32:02 Identifying Kerberoastable admin-linked accounts and escalating to domain compromise
  • 39:34 Mitigations and monitoring: strong passwords, least privilege, gMSAs, and event visibility
Watch More
Identity and Access Security

Seasonal Cybersecurity Risks for Transport Webinar

Smarttech247 leaders discuss transportation cybersecurity, focusing on OT security, digital twins, evolving threats, third-party risk, and resilience.

HSE Ransomware Attack and the Future of Cybersecurity in Ireland

Cybersecurity leaders discuss the HSE ransomware attack and a path forward for Ireland, focusing on resilience, regulation, maturity models, and public awarenes

Ransomware Cyber Attack Simulation Webinar

Attack simulation showing a multi-stage ransomware campaign and how Cybereason detects, correlates, and responds to fileless and living-off-the-land techniques.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365