npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
> **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Guides Kerberoasting attacks on Active Directory: enumerates SPNs, requests TGS tickets, cracks offline with hashcat, validates credentials. For authorized red-teaming.
Performs Kerberoasting attacks on Active Directory service accounts using Impacket's GetUserSPNs.py to request TGS tickets for offline cracking. For authorized pentesting and red teaming.
Performs Kerberoasting attacks on Active Directory service accounts: enumerates SPN users, requests TGS tickets, cracks hashes offline with Hashcat or John, verifies credentials.
Share bugs, ideas, or general feedback.
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Kerberoasting is a post-exploitation technique that targets service accounts in Active Directory by requesting Kerberos TGS (Ticket Granting Service) tickets for accounts with Service Principal Names (SPNs) set. These tickets are encrypted with the service account's NTLM hash, allowing offline brute-force cracking without generating failed login events. It is one of the most common privilege escalation paths in AD environments because any domain user can request TGS tickets.
| Tool | Purpose | Platform |
|---|---|---|
| Rubeus | Kerberoasting and ticket manipulation | Windows (.NET) |
| Impacket GetUserSPNs.py | Remote Kerberoasting | Linux/Python |
| PowerView | SPN enumeration | Windows (PowerShell) |
| hashcat | Offline password cracking | Cross-platform |
| John the Ripper | Offline password cracking | Cross-platform |