ASREProasting
ABOUT
Usually in Kerberos protocol, we are sending timestamp, encrypted with our password's hash, KDC checks it and if it's true, it sends us TGT. But with Pre-Auth turned OFF it works different (like in old Kerberos versions): We can just ask for TGT, and if we are decrypted it with our password, we are allowed in.
So in AS-REProasting we need to look for account with Pre-Auth turned OFF, so we can ask for TGT, so we can try to crack AS-REP request to get password.
Also if we have
GenericWrite
orGenericAll
rights over account, but we don't know it's password, we could make it turn-off Pre-Auth, crack it, and get the password.
LINUX
Hashcat AS-REP Crack
Kerbrute AS-REP Retrieve
Kerbrute will automatically get AS-REP's for users which do not have pre-auth
Impacket's GetNPUsers
WINDOWS
PowerView Check
Rubeus ASREProasting
RESOURCES
Last updated