ASREPRoast
Retrieve the Kerberos 5 AS-REP etype 23 hash of users without Kerberos pre-authentication required
Last updated
Retrieve the Kerberos 5 AS-REP etype 23 hash of users without Kerberos pre-authentication required
Last updated
You can retrieve the Kerberos 5 AS-REP etype 23 hash of users without Kerberos pre-authentication required if you have a list of users on the domain
The ASREPRoast attack looks for users without Kerberos pre-authentication required. That means that anyone can send an AS_REQ request to the KDC on behalf of any of those users, and receive an AS_REP message. This last kind of message contains a chunk of data encrypted with the original user key, derived from its password. Then, by using this message, the user password could be cracked offline. More detail in .
Using a wordlist, you can find wordlists of username here
If you have one valid credential on the domain, you can retrieve all the users and hashs where the Kerberos pre-authentication is not required
To crack hashes on the file output.txt with hashcat use the following options: