Cybersecurity and Applied AI career intelligence
Get weekly cybersecurity and Applied AI career intelligence
By subscribing you agree to our privacy policy. Unsubscribe anytime.
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D., M.S. · Cybersecurity and Applied AI career intelligence · Est. 2024
Kerberos protocol + 'roasting'. KUR-bur-os is the protocol name (from Greek mythology).
An Active Directory attack that extracts service account ticket-granting service (TGS) tickets and cracks them offline. Any authenticated domain user can request TGS tickets for service accounts. Attackers crack the tickets offline to reveal service account passwords, which often carry admin-level privileges.
Kerberoasting is one of the most effective post-compromise techniques in Windows environments. Penetration testers include Kerberoasting in every Active Directory assessment. SOC analysts monitor for unusual TGS ticket requests that signal Kerberoasting. Security engineers mitigate it by using long, complex service account passwords and managed service accounts.
An Active Directory attack that extracts service account ticket-granting service (TGS) tickets and cracks them offline. Any authenticated domain user can request TGS tickets for service accounts. Attackers crack the tickets offline to reveal service account passwords, which often carry admin-level privileges.
Kerberoasting is one of the most effective post-compromise techniques in Windows environments. Penetration testers include Kerberoasting in every Active Directory assessment. SOC analysts monitor for unusual TGS ticket requests that signal Kerberoasting. Security engineers mitigate it by using long, complex service account passwords and managed service accounts.
Cybersecurity professionals who work with Kerberoasting include Penetration Tester, SOC Analyst, Security Engineer. These roles apply Kerberoasting knowledge within the Offensive Security domain.
Definitions are original explanations written for career development purposes. For authoritative technical definitions, refer to NIST, ISO, or the relevant standards body.
Was this page helpful?
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options