AS-REP Roasting
AS-REP roasting is a technique that allows retrieving password hashes for users that have Do not require Kerberos preauthentication property selected:

Those hashes can then be cracked offline, similarly to how it's done in T1208: Kerberoasting.
Execution

Cracking AS-REP Hashes with HashCat
Say this is the hash we get for the potential victim:
We need to insert 23 after the $krb5asrep$ like so:
We can then crack it:


References
Last updated
Was this helpful?