Why are service accounts attractive targets for attackers?
▼
Service accounts often have elevated privileges, rarely have MFA, frequently use static passwords that are never rotated, and their activity is less monitored than interactive user accounts.
What is Kerberoasting and how does it target service accounts?
▼
Kerberoasting exploits the fact that any authenticated domain user can request a Kerberos service ticket for any account with an SPN. The ticket is encrypted with the service accounts password hash, which can be cracked offline.
How do I audit all service accounts in Active Directory?
▼
Search for accounts with ServicePrincipalName set, accounts with 'Password Never Expires' flag, accounts in service-related OUs, and accounts with 'svc_' or similar naming conventions.