kerberoast-attack
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides detailed instructions and command templates for numerous Active Directory exploitation tools, including the Impacket suite (GetUserSPNs, GetNPUsers, secretsdump, ticketer, getST, RBCD, addcomputer), NetExec, and LDAP utilities. These are used for service principal name discovery, ticket requests, and credential harvesting.
- [COMMAND_EXECUTION]: Included Python automation scripts in the reference documentation use the subprocess.run function to interface with system commands. The implementation is transparent, focusing on operational security (OPSEC) through rate-limiting and random delays to mimic legitimate traffic patterns.
- [COMMAND_EXECUTION]: Reference material includes commands for offline password cracking using GPU-accelerated tools like Hashcat and CPU-based tools like John the Ripper, covering various Kerberos encryption types (RC4, AES128, AES256).
Audit Metadata