Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 583

Kerberoasting

What is Kerberoasting?

KerberoastingAn offline password attack that requests Kerberos service tickets for service accounts and cracks the encrypted portion to recover their cleartext passwords.


Kerberoasting abuses the fact that any authenticated domain user can request a TGS for any service principal (SPN) and that the ticket is encrypted with the service account's password hash. An attacker enumerates SPNs, requests TGS tickets (commonly with Rubeus or Impacket's GetUserSPNs), exports them, and cracks them offline using Hashcat or John the Ripper. Service accounts with weak, non-rotated passwords frequently fall in hours. MITRE ATT&CK records the technique as T1558.003 (Steal or Forge Kerberos Tickets: Kerberoasting). Defences include long random passwords or gMSA for service accounts, AES-only Kerberos, restricting SPNs on privileged accounts, and alerting on bulk TGS requests with RC4 encryption.

Examples

  1. 01

    Running Rubeus kerberoast on a low-privileged user to harvest TGS tickets, then cracking them with Hashcat.

  2. 02

    Discovering that a Domain Admin has an SPN with a weak password, then escalating to domain compromise.

Frequently asked questions

What is Kerberoasting?

An offline password attack that requests Kerberos service tickets for service accounts and cracks the encrypted portion to recover their cleartext passwords. It belongs to the Attacks & Threats category of cybersecurity.

What does Kerberoasting mean?

An offline password attack that requests Kerberos service tickets for service accounts and cracks the encrypted portion to recover their cleartext passwords.

How does Kerberoasting work?

Kerberoasting abuses the fact that any authenticated domain user can request a TGS for any service principal (SPN) and that the ticket is encrypted with the service account's password hash. An attacker enumerates SPNs, requests TGS tickets (commonly with Rubeus or Impacket's GetUserSPNs), exports them, and cracks them offline using Hashcat or John the Ripper. Service accounts with weak, non-rotated passwords frequently fall in hours. MITRE ATT&CK records the technique as T1558.003 (Steal or Forge Kerberos Tickets: Kerberoasting). Defences include long random passwords or gMSA for service accounts, AES-only Kerberos, restricting SPNs on privileged accounts, and alerting on bulk TGS requests with RC4 encryption.

How do you defend against Kerberoasting?

Defences for Kerberoasting typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also