AS-REP Roasting Attack
Windows 2008 R2
AS-REP Roasting is an attack against authentication using the Kerberos protocol, with the aim of exploiting Kerberos vulnerabilities to obtain user credentials in the Active Directory.
Kerberos is a network authentication protocol used to securely verify users and services on computer networks. The Kerberos protocol uses tickets to verify user identity. In Active Directory, user credentials include a password hash and an AES key for KERBEROS.
AS-REP Roasting exploits a vulnerability in the Kerberos protocol, which allows attackers to collect AS-REP responses by sending invalid authentication requests (AS-REQ) in certain circumstances. The AS-REP response contains the user's encrypted AES key, which attackers can use to crack the password hash and obtain user credentials.
Environment Setup
If the domain user has the option "Do not require Kerberos preauthentication" set, this option is typically not enabled by default.
To obtain a hash using Rubeus.exe
To find users in the domain who have "Do not require Kerberos preauthentication"
To obtain the hash returned by AS-REP, use ASREPRoast.ps1 in Markdown format.
User Brute-Forcing
Obtaining Ticket Information for a Specific User
Windows event ID 4768 is the event ID for the Kerberos authentication service, which is used to record events of Kerberos authentication requests. This event ID usually does not indicate an attack by itself, but if you notice an abnormal amount or unauthorized Kerberos authentication requests, it may indicate an attack.