<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kerberoasting on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/kerberoasting/</link><description>Recent content in Kerberoasting on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/kerberoasting/index.xml" rel="self" type="application/rss+xml"/><item><title>Kerberoasting: Stealing Service Tickets to Crack Passwords Offline</title><link>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</guid><description>&lt;p&gt;Kerberoasting is one of the most reliably effective Active Directory attack techniques: it requires only a valid domain account, leaves minimal traces by default, and yields plaintext service account credentials that often grant significant lateral movement opportunities. Unlike many AD attacks that require elevated access or interaction with specific hosts, Kerberoasting operates entirely through legitimate Kerberos protocol requests — making it difficult to block without fundamentally changing service account management practices.&lt;/p&gt;</description></item></channel></rss>