What is Rubeus?
Rubeus is a C# toolset for raw Kerberos interaction and abuses. It provides comprehensive functionality for Kerberos ticket manipulation, credential extraction, and advanced attack techniques against Active Directory environments.Kerberos Authentication Flow & Rubeus Commands
The diagram below illustrates the complete Kerberos authentication process and shows where specific Rubeus commands interact with each step:Command Categories Mapped to Kerberos Flow
- Phase 1: Initial Auth
- Phase 2: Service Tickets
- Ticket Management
- Advanced Attacks
TGT Acquisition Commands:
asktgt- Request TGT with various auth methodsbrute- Password spray attackspreauthscan- Find accounts without pre-authasreproast- Extract hashes from AS-REP responsesrenew- Extend TGT validity
Key Capabilities
Ticket Operations
Request, renew, and manipulate Kerberos tickets
Credential Extraction
Extract and harvest Kerberos tickets from memory
Attack Techniques
Implement advanced Kerberos attacks and abuses
Ticket Forgery
Create golden, silver, and diamond tickets
Command Categories
Ticket Requests and Renewals
Ticket Acquisition
Ticket Acquisition
Attack Operations
Attack Operations
brute- Kerberos password bruteforcepreauthscan- Scan for accounts without pre-authentication
Advanced Attack Techniques
Delegation Abuse
Delegation Abuse
s4u- S4U constrained delegation abuse
Ticket Forgery
Ticket Forgery
Credential Attacks
Credential Attacks
kerberoast- Kerberoasting attacksasreproast- AS-REP roasting attacks
Ticket Management
Ticket Operations
Ticket Operations
Attack Methodology
1
Reconnaissance
Use
preauthscan to identify accounts without pre-authentication requirements2
Credential Attacks
Perform
kerberoast or asreproast to extract crackable hashes3
Ticket Acquisition
Use
asktgt with compromised credentials to obtain valid tickets4
Lateral Movement
Leverage
s4u delegation abuse or ptt for lateral movement5
Persistence
Create
golden or silver tickets for persistent accessOperational Security Considerations
Detection Vectors
Detection Vectors
Host-Based Detection:
- Non-lsass.exe processes issuing Kerberos traffic
- Use of sensitive APIs like LsaCallAuthenticationPackage()
- Abnormal ticket types (e.g., RC4 in AES environments)
- Raw Kerberos port 88 traffic patterns
- Encryption downgrade indicators
- Unusual authentication request patterns
- RC4_HMAC usage in modern environments
- Abnormal ticket request patterns
- Authentication anomalies
Operational Best Practices
Operational Best Practices
Minimize Detection:
- Use AES encryption when possible (
/opsecflag) - Implement appropriate delays between operations
- Blend with normal authentication patterns
- Avoid running from disk when possible
- Consider in-memory execution methods
- Be aware of AMSI and PowerShell protections
Technical Background
Kerberos Protocol
Kerberos Protocol
Rubeus implements raw Kerberos protocol interactions, allowing for:
- Direct manipulation of authentication flows
- Bypass of normal Windows authentication mechanisms
- Implementation of attack techniques not possible through standard APIs
ASN.1 Implementation
ASN.1 Implementation
Uses custom ASN.1 parsing for:
- Ticket structure manipulation
- Custom PAC construction
- Advanced ticket forgery capabilities
Prerequisites
Environment Requirements
Environment Requirements
- .NET Framework 3.5+ or .NET Core
- Active Directory environment
- Domain connectivity for most operations
Privilege Requirements
Privilege Requirements
- Standard User: Basic ticket operations, roasting attacks
- Elevated User: Ticket extraction, memory operations
- SYSTEM: Full ticket harvesting capabilities
Common Use Cases
Red Team Operations
Credential harvesting, lateral movement, and persistence establishment
Penetration Testing
Kerberos security assessment and vulnerability validation
Security Research
Kerberos protocol analysis and attack technique development
Incident Response
Understanding and analyzing Kerberos-based attacks