Attack Chain

  1. AS-REP roast a low-privileged user
  2. Kerberoast service accounts and pivot to server
  3. Abuse RBCD to impersonate privileged user
  4. DCSync to extract secrets, establish persistence

Persistence