AS-REP Roasting targets Active Directory accounts with the "Do not require Kerberos preauthentication" flag enabled. When preauthentication is disabled, the domain controller returns an AS-REP message encrypted with the user's password hash. Attackers capture this message and then perform offline brute-force or dictionary attacks to recover the plaintext password.

image.png

MITRE ATT&CK ID: T1558.004


1- Understanding the Attack


2- Steps of an AS-REP Roasting Attack

a. Identify Vulnerable Accounts

b. Extract AS-REP Hashes

c. Offline Password Cracking