← Back to Identifying Kerberoastable Service Accounts

Identifying Kerberoastable Service Accounts Quiz

6 questions


1.Why are computer account SPNs not viable Kerberoasting targets?

2.How does the pwdLastSet attribute help prioritize Kerberoasting targets?

3.What distinguishes the discovery step of identifying Kerberoastable accounts from the actual Kerberoasting attack?

4.What does the presence or absence of Group Managed Service Accounts (gMSAs) tell an attacker about the environment?

5.Why is a Kerberoastable service account in Domain Admins a fundamentally different finding than one with access to a single non-sensitive application?

6.What is targeted Kerberoasting, and how does its discovery step differ from standard SPN enumeration?