Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.lang.basic.visual.misc > #4031

Setspn.exe Download __EXCLUSIVE__

Newsgroups comp.lang.basic.visual.misc
Date 2024-01-18 06:51 -0800
Message-ID <0216e144-af7c-404b-bfa4-891a80be9fd0n@googlegroups.com> (permalink)
Subject Setspn.exe Download __EXCLUSIVE__
From Elin Lidstrom <lidstromelin18@gmail.com>

Show all headers | View raw


<div>Just ran the best practice analyzer on an old Exchange server & ran across the error "Missing FQDN in service principal name". I know that I have to run the setspn.exe -a SMTPSVC/ command, but I am a little confused as to what I actually put in there.</div><div></div><div></div><div>The following table contains possible examples of setspn.exe being misused. While setspn.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.</div><div></div><div></div><div></div><div>setspn.exe download</div><div></div><div>Download &gt; https://t.co/35tryUHemH</div><div></div><div></div><div></div><div></div><div></div><div></div><div>The following analytic identifies setspn.exe usage related to querying the domain for Service Principle Names. typically, this is a precursor activity related to kerberoasting or the silver ticket attack. </div><div></div><div>What is a ServicePrincipleName? </div><div></div><div>A service principal name (SPN) is a unique identifier of a service instance. SPNs are used by Kerberos authentication to associate a service instance with a service logon account. This allows a client application to request that the service authenticate an account even if the client does not have the account name.</div><div></div><div>Example usage includes the following \</div><div></div><div></div><div></div><div></div><div>Classic</div><div></div><div>The original method as discovered by Tim Medin was somewhat more involved. It made use of native Windows software such as setspn.exe and klist.exe, to identify SPNs and request tickets respectively. Additionally Mimikatz was required to carve the tickets from memory before the hash could be cracked. Lastly hash cracking software such as Hashcat and John the Ripper did not yet support this format, meaning cracking was done with a (slow) Python script. Below is a demonstration of the manual steps required to successfully crack the service account's password.</div><div></div><div></div><div></div><div>Using setspn.exe it is possible to search a domain and/or forest for accounts that have a Service Principal Name configured.</div><div></div><div></div><div></div><div></div><div>Note UserName is the user account that the application pool is running under. Also note that if you are running the setspn.exe command on a Windows 2000 machine, use the -A switch instead of the -S switch.After you set the SPN for the HTTP service to the domain user account that the application pool is running under, you can successfully connect to the Web site without being prompted for your user credentials.</div><div></div><div> df19127ead</div>

Back to comp.lang.basic.visual.misc | Previous | Next | Find similar


Thread

Setspn.exe Download __EXCLUSIVE__ Elin Lidstrom <lidstromelin18@gmail.com> - 2024-01-18 06:51 -0800

csiph-web