| Home > CAPEC List > CAPEC-509: Kerberoasting (Version 3.9) |
|
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 652 | Use of Known Kerberos Credentials |
| CanPrecede | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 151 | Identity Spoofing |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Subvert Access Control |
| Techniques |
|---|
| These can be found via Powershell or LDAP queries, as well as enumerating startup name accounts and other means. |
| Techniques |
|---|
| Using user account's SPN value, request other service tickets from Active Directory |
| Techniques |
|---|
| Certain tools like Mimikatz can extract local tickets and save them to memory/disk. |
| Techniques |
|---|
| Leverage a brute force application/script on the hashed value offline until cracked. The shorter the password, the easier it is to crack. |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 522 | Insufficiently Protected Credentials |
| 308 | Use of Single-factor Authentication |
| 309 | Use of Password System for Primary Authentication |
| 294 | Authentication Bypass by Capture-replay |
| 263 | Password Aging with Long Expiration |
| 262 | Not Using Password Aging |
| 521 | Weak Password Requirements |
| Entry ID | Entry Name |
|---|---|
| 1558.003 | Steal or Forge Kerberos Tickets:Kerberoasting |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2019年04月04日 (Version 3.1) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated @Status, Example_Instances, References, Related_Attack_Patterns, Related_Weaknesses, Taxonomy_Mappings | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated Execution_Flow | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||