Overview
Scan for user accounts that do not require Kerberos pre-authentication. Accounts without pre-authentication requirements are vulnerable to AS-REP roasting attacks, allowing offline password cracking.Syntax
Required Parameters
File containing list of usernames to test
Optional Parameters
Target domain (default: current domain)
Domain controller to target
KDC proxy URL for authentication
Examples
Pre-Authentication Overview
Kerberos Pre-Authentication
Kerberos Pre-Authentication
Security Mechanism:
- Requires proof of password knowledge before TGT issuance
- Prevents offline password attacks
- Enabled by default for all accounts
- AS-REQ returns encrypted TGT without pre-auth
- Enables AS-REP roasting attacks
- Often misconfigured for compatibility
Attack Integration
AS-REP Roasting Preparation
AS-REP Roasting Preparation
Vulnerability Identification:Workflow Integration:
- Identify accounts without pre-auth
- Target them with AS-REP roasting
- Crack extracted hashes offline
- Use credentials for further attacks
Related Commands
asreproast- Exploit accounts without pre-authbrute- Password attack vulnerable accounts