Kerberoasting
Level: Hard
Challenge: Kerberoasting
Summary


Q1: Kerberoasting activity occurred within a specific timeframe. What is the exact date and time of the attack?

Q2: What service name did the attacker target during the Kerberoasting attempt?

Q3: Sarah notices that the attacker requested a Kerberos service ticket. Which account was used to make this request?
Q4: While investigating further, Sarah identifies the IP address and port of the login session during the attack. What are the source IP address and port for this login?
Q5: As Sarah discovered that the attacker created a new user account for persistence. Can you determine the name of this newly created account?

Q6: The attacker then created a scheduled task to ensure persistence. What is the exact timestamp when the task was created?



Q7: Afterwards, the attacker logged in successfully using the newly created account. What source port was used for this login?

Q8: Sarah traced the attacker's steps back to the first interaction with a compromised machine. When did the attacker first interact with this machine?


Q9: After pivoting through the compromised machine, Sarah identifies the account name used for the initial successful login. What account name was used by the attacker?
Last updated