AS-REP Roasting is Kerberoasting's sibling attack. While Kerberoasting targets service accounts with SPNs, AS-REP Roasting targets accounts that don't require Kerberos pre-authentication.Related
The best part? You don't even need valid domain credentials. Just a list of usernames is enough to request crackable hashes for vulnerable accounts.
Pre-Authentication Explained
Normally, Kerberos requires you to prove you know the password BEFORE giving you a ticket (pre-auth). When this is disabled, the KDC gives you an encrypted ticket for free - crackable offline.
How AS-REP Roasting Works
Finding Vulnerable Accounts
With Domain Credentials
Without Credentials
You can test usernames without authentication. If pre-auth is disabled, the KDC returns an AS-REP. If enabled, it returns an error.
Username Enumeration Bonus
Even if pre-auth is enabled, the error message differs for valid vs invalid users. You get user enumeration for free!
Performing the Attack
From Windows
From Linux
Cracking AS-REP Hashes
Cracking Speed
AS-REP hashes crack slightly slower than TGS (Kerberoast) hashes, but still at millions per second on a decent GPU.
AS-REP Roasting Methodology
AS-REP Roasting Flow
1
Get UsernamesOSINT, LDAP enum, or password spray results
2
Test Pre-AuthRequest AS-REP for each user
3
Collect HashesSave hashes for vulnerable accounts
4
CrackHashcat mode 18200 with wordlists
5
Use CredsAuthenticate with cracked passwords
Setting the Vulnerability
If you have write access to a user (GenericAll, GenericWrite), you can MAKE them vulnerable to AS-REP Roasting!
This is an Attack Technique
Modifying accounts to disable pre-auth is detectable. Use this when you have write access but not password reset rights.
Kerberoasting vs AS-REP Roasting
| Aspect | Kerberoasting | AS-REP Roasting |
|---|---|---|
| Target | Accounts with SPNs | Accounts without pre-auth |
| Credentials Needed | Any domain user | Just username list |
| Hashcat Mode | 13100 / 19700 | 18200 |
| Prevalence | Very common | Less common |
Knowledge Check
Challenges
Key Takeaways
- AS-REP Roasting targets accounts without pre-authentication required
- No domain credentials needed - just a username list
- Use hashcat mode 18200 for cracking
- If you can modify a user, you can enable the vulnerability
- Less common than Kerberoasting but still valuable
- Username enumeration is a bonus side effect