Kerberos Attack Tools
That said, understanding the tools that attackers may use is crucial for defenders to be aware of potential threats and take appropriate measures. Some tools commonly associated with Kerberoasting attacks include:
PowerShell is a powerful scripting language built into Windows. There are various PowerShell scripts, such as PowerView and Invoke-Kerberoast, that can be used to identify service accounts, request service tickets, and perform other steps in the Kerberoasting process. A lot of these scripts are included as modules in Command and Control (C2) frameworks. Learn more about C2’s and their attack modules in my “Advanced Security Testing with Kali Linux” book.
Rubeus is a powerful post-exploitation ...