7.2 - AS-REP Roasting
AS-REP Roasting
AS-REP Roasting exploits accounts for which Kerberos preauthentication is disabled. In a typical Kerberos authentication process, the client must send a timestamp encrypted with its password-derived key. This serves as proof that the authentication request is not being replayed.
However, if preauthentication is disabled, the client does not need to send this encrypted timestamp. As a result, an attacker can request a Ticket Granting Ticket (TGT) for the target user and receive an AS-REP message encrypted with the user’s password hash.
AS-REP Process
In this case we can jump the first step because the preauth is disabled. Once an attacker captures the AS-REP, they can attempt to crack the user's password offline.
Example: Exploiting AS-REP Roasting
Step 1: Create a User
Step 2: Disable Preauthentication
Or via PowerShell:
Step 3: Perform AS-REP Roasting using Impacket
Step 4: Crack the Ticket
Other Resources
Last updated