Targeted Kerberoasting - AS-REPs
Targeted Kerberoasting - AS-REPs
If a user's UserAccountControl settings have "Do not require Kerberos preauthentication" enabled i.e. Kerberos preauth is disabled, it is possible to grab user's crackable AS-REP and brute-force it offline.
With sufficient rights (GenericWrite or GenericAll), Kerberos preauth can be forced disabled as well.
Kerberos is enabled by default and it is rare to find this.
Requirements:
If we have enough permission over users or groups, we can disable DoesnotRequirePreAuth for the users.
If the Kerberos is already disabled
./john vpn1user.txt --wordlist=wordlist.txt
Get-DomainUser -PreauthNotRequired -Verbose
if any user has Does not RequirePreAuth, can be used for this attack
Invoke-ACLScanner -ResolveGUIDs | ?{$_.IdentityReferenceName -match "RDPUsers"}
Last updated
Was this helpful?