ASREPRoast
Retrieve the Kerberos 5 AS-REP etype 23 hash of users without Kerberos pre-authentication required
You can retrieve the Kerberos 5 AS-REP etype 23 hash of users without Kerberos pre-authentication required if you have a list of users on the domain
Without authentication
The ASREPRoast attack looks for users without Kerberos pre-authentication required. That means that anyone can send an AS_REQ request to the KDC on behalf of any of those users, and receive an AS_REP message. This last kind of message contains a chunk of data encrypted with the original user key, derived from its password. Then, by using this message, the user password could be cracked offline. More detail in Kerberos theory.
Using a wordlist, you can find wordlists of username here
Set the password value to '' to perform the test without authentication
With authentication
If you have one valid credential on the domain, you can retrieve all the users and hashes where the Kerberos pre-authentication is not required
Use option kdcHost when the domain name resolution fail
Cracking with hashcat
To crack hashes on the file output.txt with hashcat use the following options:
Example
Forest machine is a good example to test ASREPRoast with NetExec
Ressources
Last updated