AS-REP Roasting
Last updated
Last updated
AS-REP Roasting targets Active Directory accounts without Kerberos Pre-authentication.
The attack is made in few steps:
Attacker sends request in order to get TGT from the Authentication Server for target user without using pre-authentication.
Authentication Server sends encrypted TGT to the attacker.
Attacker brute-forces the TGT offline to obtain the user's password.
Enumerating accounts with Kerberos pre-authentication disabled from inside the network.
unauthenticated:
Authenticated