Target accounts without Kerberos pre-authentication.
Request AS-REP responses.
Crack offline.
No prior credentials needed.
Active Directory Preauthentication Bypass Attack
Requires: No credentials (if anonymous LDAP enabled) • Difficulty: Low • Impact: Critical
💻 Desktop Experience Available
View this module on desktop for an interactive AS-REP Roasting simulation with hash extraction and cracking visualization.
AS-REP Roasting is an Active Directory attack that targets user accounts with the "Do not require Kerberos preauthentication" attribute enabled. Unlike Kerberoasting which requires domain authentication, AS-REP Roasting can extract password hashes without any credentials—making it even more dangerous.
Critical Difference from Kerberoasting: AS-REP Roasting requires ZERO domain credentials. You can request AS-REP tickets for any account with preauth disabled from an unauthenticated state. This makes it a powerful initial access technique.
Why Preauth Exists: Kerberos preauthentication (PA-ENC-TIMESTAMP) prevents offline password attacks by requiring the client to prove knowledge of the password before the KDC issues a ticket. Disabling it for compatibility reasons (legacy systems) creates this vulnerability.
AS-REP Roasting techniques should only be used in authorized penetration testing, red team engagements, or controlled lab environments. Unauthorized access to computer systems is illegal under CFAA and equivalent laws worldwide. Always obtain written permission before testing.
Target accounts without Kerberos pre-authentication & crack offline