AS-Rep Roasting
The first step of the authentication process via Kerberos is to send an AS-REQ
. Based on this request, the DC can validate if the authentication is successful. If so, the DC replies with an AS-REP containing the TGT. This step is also called Kerberos Preauthentication. It prevents offline password guessing.
Without Kerberos Preauthentication, an attacker is ablet to send an AS-REQ to the DC on behalf of any AD user. After obtaining the AS-REP from the DC, the attacker could perform offline cracking against the encrypted part of the response. This is the AS-REP Roasting attack.
IMPORTANT: By default, the AD user account option "Do not require Kerberos preauthentication" is disabled, meaning that Kerberos preauthentication is performed for all AD users. But it's quite common to find legacy (or not) services that requires this option to be enabled.
Linux:
NOTE:
users.txt
includes usernames to be checked (one username per line).
Windows: