🏛️ CORP\Active Directory Portal

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — LDAP injection in login, pass the hash, Kerberoasting simulation, exposed NTLM hashes.

Kerberoasting — Service Principal Names

Accounts with SPNs can have their service tickets requested by any authenticated user. The ticket is encrypted with the account's password hash — crack it offline to get the password.

UsernameSPNHash (crack this)Status
john.smithHTTP/webserver.corp.localb56e0b4ea4962283bee762525c2d490fKerberoastable
svc_sqlMSSQLSvc/sqlserver.corp.local:1433f5603806582528dcbd85c58ff552cd6cKerberoastable
svc_iisHTTP/iisserver.corp.locald1a1674cc2138e76e4477654e1e7c1e6Kerberoastable

In a real attack: use Impacket GetUserSPNs.py or Rubeus to request tickets, then crack the hash with Hashcat: hashcat -m 13100 hash.txt wordlist.txt