Rubeus is a Windows-only post-exploitation tool for attacking Kerberos. No compiled binaries are available (either through the GitHub repo or Kali Linux’s windows-binaries package).
Important
To use Rebueus you need to already be on the domain you are attacking, or alternately need to have mapped the domain controller (which normally hosts the KDC) IP address properly in C:\Windows\System32\drivers\etc\hosts.
Harvest Kerberos tickets
Password spraying
Kerberoasting
Kerberoasting with Rubeus
The password hashes output here can then be cracked with Hashcat (use the 13100 hash mode).
To use Hashcat to crack the hashes obtained in this fashion, first insert 23$ after the leading $kerb5asrep$ (so $kerb5asrep$ → $kerb5asrep$23$) and then use mode 18200.
Take the output of the last command above and paste it into a $CERTIFICATE_PEM_FILE on the attacking box. Then:
Move $CERTIFICATE_PFX_FILE back to the target, and then use Rubeus to seal the deal:
This is very useful if we’ve used an AD CS misconfiguration as described by SpectreOps’ “Certified Pre-Owned” research to forge a certificate that’s valid for another user.