Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/gather/asrep.md
Views: 11784
ASREP-roast
The auxiliary/gather/asrep
module can be used to find users who have Pre-authentication disabled, and retrieve credentials that can be cracked using a hash-cracking tool.
The following ACTIONS are supported:
BRUTE_FORCE: Make TGT requests for all usernames in a given file. This does not require valid domain credentials.
LDAP: Request the set of users with pre-authentication disabled using an LDAP query, and then request TGTs for these users.
Module usage
Start
msfconsole
Do:
use auxiliary/gather/asrep
Do:
run action=BRUTE_FORCE user_file=<file> rhost=<IP> domain=<FQDN> rhostname=<hostname>
The module will attempt to request TGTs for each of the users in the file. This should not lock out accounts. A crackable value will be displayed for all identified accounts.
Do:
run action=LDAP rhost=<IP> username=<LDAP_User> password=<LDAP_Password> domain=<FQDN> rhostname=<hostname>
The module will use LDAP to request the users without pre-auth required, and request TGTs for these users. A crackable value will be displayed for all identified accounts.
Options
DOMAIN
The Fully Qualified Domain Name (FQDN). Ex: mydomain.local.
USER_FILE
The file containing a list of usernames, each on a new line.
Rhostname
The hostname of the domain controller. Must be accurate otherwise the module will silently fail, even if users exist without pre-auth required.
USE_RC4_HMAC
Request a ticket with the lower-security, more easily crackable, RC4_HMAC encryption type. This is usually preferable, but may be less stealthy.
Scenarios
Brute forcing users
An example of brute forcing usernames, in the hope of finding one with pre-auth not required: