ExamGecko
Question list
Search
Search

Related questions











Question 536 - 312-50v12 discussion

Report
Export

A malicious user has acquired a Ticket Granting Service from the domain controller using a valid user's Ticket Granting Ticket in a Kerberoasting attack. He exhorted the TGS tickets from memory for offline cracking. But the attacker was stopped before he could complete his attack. The system administrator needs to investigate and remediate the potential breach. What should be the immediate step the system administrator takes?

A.
Perform a system reboot to clear the memory
Answers
A.
Perform a system reboot to clear the memory
B.
Delete the compromised user's account
Answers
B.
Delete the compromised user's account
C.
Change the NTLM password hash used to encrypt the ST
Answers
C.
Change the NTLM password hash used to encrypt the ST
D.
invalidate the TGS the attacker acquired
Answers
D.
invalidate the TGS the attacker acquired
Suggested answer: D

Explanation:

A Kerberoasting attack is a technique that exploits the Kerberos authentication protocol to obtain the password hash of a service account that has a Service Principal Name (SPN). An attacker can request a service ticket (TGS) for the SPN using a valid user's ticket (TGT) and then attempt to crack the password hash offline. To prevent the attacker from using the TGS to access the service, the system administrator should invalidate the TGS as soon as possible. This can be done by changing the password of the service account, which will generate a new password hash and render the old TGS useless. Alternatively, the system administrator can use tools like Mimikatz to purge the TGS from the memory of the domain controller or the client system. Performing a system reboot, deleting the compromised user's account, or changing the NTLM password hash used to encrypt the ST are not effective ways to invalidate the TGS, as they do not affect the encryption of the TGS or the validity of the TGT.Reference:

EC-Council CEHv12 Courseware Module 11: Hacking Webservers, page 11-24

What is a Kerberoasting Attack? -- CrowdStrike

How to Perform Kerberoasting Attacks: The Ultimate Guide - StationX

asked 18/09/2024
Ramon Pasay
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first