performing-kerberoasting-attack

Fail

Audited by Socket on Mar 15, 2026

5 alerts found:

Obfuscated FileSecurityx3Anomaly
Obfuscated FileHIGH
references/workflows.md

This document is a clear, actionable offensive playbook for Kerberoasting and post-exploitation against Active Directory. It enumerates data sources, shows how to obtain and persist TGS hashes, provides detailed cracking configurations, and demonstrates credential reuse for lateral movement and DCSync. It also contains OPSEC tips to evade detection. Treat distribution or execution of these instructions as high risk: they facilitate credential theft, privilege escalation, and domain compromise. Defensive teams should monitor for the enumerated behaviors and commands and treat artifacts matching these patterns as potential compromise indicators.

Confidence: 98%
SecurityMEDIUM
scripts/agent.py

This is a dual-use offensive security tool for Kerberoasting: it enumerates AD SPN accounts, requests TGS tickets using impacket, stores and parses krb5tgs hashes, analyzes encryption types, and can detect Kerberoasting events in EVTX or live logs. The code contains no direct obfuscated or network-exfiltration malicious payloads, no hardcoded secrets, and no backdoor. However, its functionality is inherently sensitive and can be abused for unauthorized credential harvesting and lateral movement in Active Directory environments. Use only in authorized, controlled testing. Recommend restricting filesystem permissions for temporary outputs, validating inputs when used programmatically, and limiting runtime to authorized operators.

Confidence: 90%Severity: 75%
AnomalyLOW
scripts/process.py

This is an offensive security/assessment script for Kerberoasting: it enumerates SPN-enabled accounts, helps request TGS tickets (or prints appropriate Impacket/Rubeus commands), analyzes kerberoast hashes, and writes a report. The code itself does not contain covert exfiltration, obfuscated payloads, or direct backdoor functionality. However, it handles and emits credentials in cleartext (building command strings containing the password) and performs sensitive network operations against a domain controller — behaviors that can be abused if run by an unauthorized user. Recommendation: treat as dual-use offensive tooling. Do not run with production credentials on hostile or untrusted machines; avoid printing credentials, and secure output and logs. Overall: not obfuscated, not covertly malicious, but capable of facilitating offensive attacks and therefore poses a moderate security risk if misused.

Confidence: 92%Severity: 60%
SecurityMEDIUM
references/api-reference.md

This package is a dual-use offensive toolkit that automates Kerberoasting: it enumerates SPN accounts, requests TGS tickets (producing $krb5tgs$ hashes), analyzes crackability, and detects related EVTX events. There is no evidence of stealthy obfuscation or external C2/exfiltration to third parties in the provided fragment, but the functionality itself enables credential extraction and privilege escalation. Use only in authorized testing environments; treat as high risk in production.

Confidence: 75%Severity: 75%
SecurityMEDIUM
SKILL.md

This skill is not coherent as a benign helper: its stated purpose is to execute a credential-theft technique against Active Directory, and its capabilities match that offensive goal. There is little evidence of covert exfiltration or obfuscation, so this is better classified as a high-risk offensive security skill rather than confirmed malware.

Confidence: 95%Severity: 96%
Audit Metadata
Analyzed At
Mar 15, 2026, 10:51 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-kerberoasting-attack%2F@6b88bea2a086f4d50cc897647b783a3a7333f224