GMSA Usage
Use Group Managed Service Accounts (gMSA). They have 240-character passwords managed by Windows, making Kerberoasting practically impossible to crack.
Unlike traditional brute force, Password Spraying involves testing a single, common password (e.g., Welcome2025!) against a large number of accounts.
This technique is designed to bypass account lockout policies. By spreading attempts across hundreds of users, the attacker stays under the radar of most automated blocking systems, betting that at least one user has chosen a weak, seasonal password.
AS-REP Roasting targets users with the specific attribute “Do not require Kerberos pre-authentication” enabled.
Normally, a user must prove they know their password before the DC issues a ticket. If pre-authentication is disabled, an attacker can request an authentication data (AS-REP) for that user. This data is encrypted with the user’s password hash and can be cracked offline.
DONT_REQ_PREAUTH set in their UserAccountControl attribute.0x0 where pre-authentication was not used is a definitive marker.Kerberoasting is one of the most effective ways to escalate privileges. It targets accounts associated with a Service Principal Name (SPN).
Any authenticated domain user can request a Service Ticket (TGS) for any service in the forest. The DC returns a ticket encrypted with the hash of the Service Account. The attacker extracts this ticket from memory and cracks it offline to retrieve the password.
| Attack Type | Target | Key Event ID | Mitigation |
|---|---|---|---|
| Password Spraying | All Domain Users | 4625 (Massive) | MFA & Strong Password Policy |
| AS-REP Roasting | Misconfigured Accounts | 4768 (Result 0x0) | Enforce Kerberos Pre-auth |
| Kerberoasting | Service Accounts (SPNs) | 4769 (Abnormal) | Long/Random Service Passwords |
GMSA Usage
Use Group Managed Service Accounts (gMSA). They have 240-character passwords managed by Windows, making Kerberoasting practically impossible to crack.
Honey Accounts
Create “Honey-SPN” accounts. Any request for a ticket on these accounts should trigger an immediate high-priority alert in your SOC.