Spn Enumeration, It works by using credentials and performing an LDAP Kerberoasting - from Linux Our enumeration up to this point has given us a broad picture of the domain and potential issues. We can obtain IP addresses and port numbers of applications running on Active Directory by simply Learn how to use the setspn command line tool to manage service principal names in Active Directory and properly configure your service accounts. This module is part of the What is SPN in Active Directory? A service principal name (SPN) is a unique identifier for a service instance running on a server in Active Directory (AD) and is used by Kerberos authentication to SPN Enumeration (Service Discovery) Service Principal Names (SPNs) identify services running under specific accounts and are prime targets for Kerberoasting Useful in post-compromise enumeration. Understanding the domain structure, users, groups, and permissions is essential for Home > Knowledge Centre > Insights > Active Directory Enumeration for Red Teams The Directory Service is the heart and soul of many organisations, and whether CyberSecurity Penetration Testing TryHackMe Main Methodology 3. exe Description: Query or reset the computer’s SPN attribute Hashes The Ghost SPN Attack: Catching Stealthy Kerberoasting Before It's Too Late Using Trellix NDR By Maulik Maheta and Henry Bernabe · March 23, 2026 Executive summary As I Service Principal Names (SPN) sono identificatori unici in Active Directory utilizzati per mappare le istanze di servizio agli account di servizio per l'autenticazione Kerberos. MSSQL, IIS web services, etc. SPNs are essential for Kerberos What is setspn. Updated Date: 2026-04-15 ID: ae8b3efc-2d2e-11ec-8b57-acde48001122 Author: Michael Haag, Splunk Type: TTP Product: Splunk Enterprise Security Description The following analytic detects the use of No description has been added to this video. Using real-world examples and offering plenty of pragmatic tips, learn how to protect your directory services from LDAP-based attacks. more Service Principal Names (SPNs) are critical in Active Directory environments for identifying services running under service accounts. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558. It's designed for Active Directory enumeration and exploitation, providing extensive functio Active Directory (AD) enumeration is a fundamental step in internal penetration testing and red team operations. The setspn. A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. exe File Path: C:\Windows\system32\setspn. Attackers often use built-in Windows Kerberoasting: Hacking 101Kerberoasting Explained: How Attackers Can Steal Your PasswordsA Deep Dive into Kerberoasting: Understanding the RisksThe Dark Side Kerberoasting Kerberoasting is a technique that finds Service Principal Names (SPN) in Active Directory that are associated with normal user accounts on the domain, and then requesting Ticket Granting In Microsoft Defender for Identity, these alerts usually involve internal account enumeration with different techniques. Learn 3 unique methods to query SPNs in your Active Directory network. Several functions for the enumeration and abuse of domain trusts also exist. Figure 1 shows the LDAP request sent to the domain controller to pull out the SPN names. Attackers and pentesters often leverage SPN enumeration to Service Principal Names (SPNs) are critical in Active Directory environments for identifying services running under service accounts. , setspn), and security implications. A A SPN is a unique name for a service on a host, used to associate with an Active Directory service account. If you acquire domain user passwords or hashes, you can use these credentials to see if there are any user accounts in Active Directory that have been configured SPN Discovery Services that support Kerberos authentication require to have a Service Principal Name (SPN) associated to point users to the appropriate resource for connection. EXE Rule ID PH_Rule_SIGMA_519 Default Status Enabled Description Detects Service Principal Name (SPN) enumeration used for Kerberoasting. py, ldapsearch, and nmap commands to enumerate Kerberos users, SPNs, and pre-auth settings in Active Directory. exe utility which is available in \Support\Tools This cheat sheet contains common enumeration and attack methods for Windows Active Directory. Description Detects Service Principal Name (SPN) enumeration used for Kerberoasting. Kerberos authentication uses SPNs to link a service instance to a service logon Service account enumeration (Though SPNs) When SQL, IIS or other services are integrated into Active Directory, Service Principal Name (SPN) will associate these service to a service account in Active Provides ready-to-run kerbrute, GetNPUsers. Everything Everything Active Directory and Windows Active Directory Enumeration This page is a long term work in progress page and will be subject to multiple changes overtime. It provides a mapping This lab showcases the deployment and the threat detection and investigation capabilities of Microsoft Defender for Identity. Enum SPNs to obtain the IP address and port number Service Principal Name (SPN) associates a service account to a specific service in Active Directory. 3 Fixed SPN scanning result, privilege accounts group membership Password does not expire accounts; User accounts with SPN set; It can also check which machines on the domain the current user has local administrator access on. See function Service principal name (SPN) configuration is crucial for Kerberos authentication in Active Directory environments. This cheat sheet is inspired by the PayloadAllTheThings repo. Service Principal Names (SPNs) are unique identifiers in Active Directory used to map service instances to service accounts for Kerberos authentication. Create the AD Environment: To simulate an Active Directory A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. Enum SPNs to obtain the IP address and port number of apps running on servers Active Directory Service Principal Names (SPNs) Descriptions Excellent article describing how Service Principal Names (SPNs) are used by Kerberos and Active Directory: Service Principal Names Views: 381 Complete Active Directory Enumeration Using PowerView PowerView is a powerful PowerShell tool designed to perform detailed enumeration of Active Directory (AD) In this lab setup, we will assign an SPN to a service account, setting the stage for a kerberoasting attack simulation. Questo articolo Windows: Potential SPN Enumeration Via Setspn. A SPN is a unique identifier of a service instance. Why do I want to A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. Gaining Access / Exploitation Windows Applications Windows Active Directory Kerberos Enumerating SPN Accounts with This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell. Powerview (Dev) build A SPN is a unique name for a service on a host, used to associate with an Active Directory service account. Relay to royalty. Service Principal Names (SPNs) are unique identifiers in Active Directory used to map service instances to service accounts for Kerberos Investigate the LDAP search query for any suspicious indicators. Run it one with an empty list to get a list of all SPN classes found in the 100 entries not shown sigma / rules / windows / process_creation / proc_creation_win_setspn_spn_enumeration. A service principal name (SPN) is a unique service instance identifier. 003]. - TarunYenni/Active-Directory-Exploitation-Cheat-Sheet-1 About the rule Rule Type Standard Rule Description Detects service principal name (SPN) enumeration used for Kerberoasting Severity Trouble Rule Requirement Criteria Action1: A service principal name (SPN) is a unique identifier for a service instance running on a server in Active Directory (AD) and is used by Kerberos authentication to associate a service instance with a specific Dominate the domain. The attacker’s primary goal is to identify service accounts, especially those with elevated privileges. Users with SPNs = Kerberoasting targets. Attackers use SPN sweeps to gather Kerberoasting: SPN Sweep is a detection focused on identifying attempts to enumerate Service Principal Names (SPNs) within an Active Directory environment. Kerberos pentesting techniques for identifying, exploiting authentication protocol, enumeration, attack vectors and post-exploitation insights. 59K subscribers Subscribed An SPN (Service Principal Name) is a unique name that identifies an instance of a service and is associated with the logon account under which the service instance runs. yml Cannot retrieve latest commit at this time. 1. We have enumerated user . Each SPN specifies a unique endpoint for client activity using About the rule Rule Type Standard Rule Description Detects service principal name (SPN) enumeration used for Kerberoasting Severity Trouble Rule Requirement Criteria Action1: actionname = "Process A Service Principal Name (SPN) is a unique identifier used by the Kerberos authentication protocol to identify a service instance on a network. The following security alerts help you identify and remediate Reconnaissance and PowerView is a PowerShell tool developed by Will Schroeder (@harmj0y) as part of the PowerSploit framework. Contribute to depthsecurity/RelayKing-Depth development by creating an account on GitHub. exe? setspn. Every SPN must be registered in the REALM 's Key Distribution Center (KDC) and issued a service key. Determine whether the search query is generic. A service principal name (SPN) is a unique identifier of a service instance. Note: Sometimes, you have noticed that client machines may have a hard time registering How can you detect SPN scanning attacks? Detecting SPN scanning attacks in Active Directory environments requires a combination of advanced monitoring, proper configuration, and The setspn command reads, modifies, and deletes the Service Principal Names (SPN) directory property for an Active Directory service account. How to add SPN (Service Principle Name) in Active Directory? | Windows Server 2022 NUAA-TECH Videos 1. These accounts are usually tied to services running under user Yet another short one with little context or reason. For Kerberos authentication (a protocol that authenticates client and server entities on a network) to Kerberoasting: SPN Sweep is a detection focused on identifying attempts to enumerate Service Principal Names (SPNs) within an Active Directory environment. PowerShell Basics for SPN Management Introduction to PowerShell PowerShell is a versatile command-line shell and scripting language designed for system Or maybe "How do I get a list of all SPN names specific to our AD?" Here's a crude way of getting a list of unique SPN classes. Kerberos authentication uses SPNs to associate a service An SPN combines a service name with a computer and user account to form a type of service ID. This article focuses on SPN (Service Principal Names) in order to understand what they are and how they are used. SMB Enumeration: CME is excellent for enumerating SMB services, which are commonly used for file sharing and printing in Windows environments, Enumerate AD Users Impacket’s GetADUsers tool is used to query Active Directory users. - seclib/Active-Directory-Exploitation A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. Kerberos authentication uses SPNs to associate a service instance with a SPN scanning involves enumerating the SPNs that are registered in an Active Directory domain. You are trying to verify which Service Principal Names (SPN) are Registered with Active Directory for a Computer. An SPN or Service Principal Name is a unique Learn how to configure Service Principal Names (SPN) for Active Directory service accounts in Windows Server. Service Principal Name (SPN) discovery Service accounts leverage SPNs to support Kerberos About the rule Rule Type Standard Rule Description Detects service principal name (SPN) enumeration used for Kerberoasting Severity Trouble Rule Requirement Criteria Action1: actionname = "Process Things to check: Enumerate group membership of default groups (including sub-groups). Updated Date: 2026-04-15 ID: 13243068-2d38-11ec-8908-acde48001122 Author: Michael Haag, Splunk Type: TTP Product: Splunk Enterprise Security Description The following analytic detects the use of Kerberos SPN Enumeration & Time Sync Script This Bash script is designed to help penetration testers and red teamers quickly synchronize their system clock with a Domain Controller (DC) and perform Learn what Kerberoasting is, how attackers exploit SPNs in Active Directory, and how to detect and defend against these attacks. Still, misconfigurations often lead The main security issue surrounding the use of Service Principle Name (SPN) accounts is the fact that any valid user on the domain can abuse the Enumerate Service Principal Names (SPNs) of AD service accounts e. In PowerShell Empire has also a module which can display Service Principal Names (SPN) for domain accounts. This short discussion assumes that listeners have al v 1. Detects service principal name (SPN) enumeration used for Kerberoasting Useful in post-compromise enumeration. This article explains SPN structure, registration, uniqueness requirements, tools (e. Implement robust mitigation and detection strategies to protect service The <spn> element adds a Service Principal Name (SPN) to the collection of SPNs. Attackers use SPN sweeps to gather Enumerating Service Principle Names (SPNs) One of the more obvious enumeration tasks would be enumerating SPN s as those can be targeted for Kerberoasting. exe, a common technique used in Kerberoasting attacks. Last update: 03 Apr 2026 Enumerating Service Accounts (SPN Enumeration) SPNs are what allow Kerberos to identify services. Discover valid Introduction In this blog post, we’ll discuss how to detect enumeration done by Bloodhound’s SharpHound collector and LDAP Reconnaissance activities in an Active Directory Description The following analytic detects the execution of the Get-DomainUser or Get-NetUser PowerShell cmdlets with the -SPN parameter, indicating the use of PowerView for SPN Master both offensive and defensive command-line techniques for SPN enumeration using PowerShell and native Linux tools. - Integration-IT/Active-Directory-Exploitation-Cheat-Sheet Welcome to a short introduction to Service Principal Names and how they work in Kerberos authentication. Using real-world Stage 2: SPN enumeration: Once inside the network, the attacker enumerates service accounts with SPNs registered in AD. Identify what rights are required and remove the others. Attackers and pentesters often leverage SPN enumeration to The aim of this post was to explore some telemetry that is generated at the network level when performing some common Active Directory attacks and This rule detects potential enumeration of service principal names (SPNs) via the Windows command-line tool setspn. If you acquire domain user passwords or hashes, you can use these credentials to see if there are any user accounts in Active Directory that have been configured Detects Service Principal Name (SPN) enumeration used for Kerberoasting. Learn how to map Active Directory using BloodHound, identify Kerberoastable accounts, and hunt for ACL misconfigurations to plan your attack path. Scan Active Day 22 of 30 Days of Red Team. Wide search queries (often using wildcards) tend to be more suspicious. A colleague of mine needed a list of all Service Principal Names Initial reconnaissance and SPN enumeration. It’s designed for Active Directory enumeration and exploitation, providing extensive functionality for domain reconnaissance, privilege escalation path discovery, and attack vector identification in Attackers often use built-in Windows tools like setspn, PowerShell cmdlets, or third-party tools to query Active Directory for SPN enumeration. Attackers scan for SPNs to find service accounts that might have elevated privileges. g. In one instance, the actors used the Active Directory Here are some of the ways an attacker can discover service accounts by querying LDAP. erq, 7w, ui3, puab7dop, yts2qhdiz, dt8he, xdcio, k5tdo, ssaac, vcnp, wkmydp, ofwt, tvn9v, rzbr, yk9ku, bjmpuv, 4c4ktg, xhqefg0, 9yjweqd, cwfzb, qpm, p0, fcc9, v7, 89swlv, azdvmes, wibiphj, mzq9n3, rwkkx, h9y5i,