Kerberoasting and AS-REP Roasting Flashcards

1
Q

What is Kerberoasting?

A

An attack that steals encrypted TGS tickets for service accounts (SPNs) to crack their passwords offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What encryption types are vulnerable in Kerberoasting?

A

RC4-HMAC (weak) or AES (stronger, but still crackable if passwords are weak).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What accounts are targeted in Kerberoasting?

A

Service accounts (accounts with SPNs, like SQL/server1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tool is commonly used for Kerberoasting?

A

Tools like Rubeus, Impacket’s GetUserSPNs, or Mimikatz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you detect Kerberoasting?

A

Look for:

Many TGS-REQ requests (Event ID 4769).

Use of RC4 encryption in tickets.

Unusual service account ticket requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you mitigate Kerberoasting?

A

Use AES encryption (disable RC4).

Assign long, complex passwords to service accounts.

Monitor for excessive TGS requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is AS-REP Roasting?

A

An attack that steals encrypted AS-REP tickets from user accounts with pre-authentication disabled to crack passwords offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What setting enables AS-REP Roasting?

A

“Do not require Kerberos pre-authentication” enabled on a user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tool is used for AS-REP Roasting?

A

Tools like Rubeus or Impacket’s GetNPUsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you detect AS-REP Roasting?

A

Look for AS-REQ requests without pre-authentication (Event ID 4768).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you mitigate AS-REP Roasting?

A

Enable Kerberos pre-authentication for all accounts.

Use strong passwords (harder to crack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the difference between Kerberoasting and AS-REP Roasting?

A

Kerberoasting targets service accounts (TGS tickets).

AS-REP Roasting targets user accounts with pre-auth disabled (AS-REP tickets).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which part of Kerberos does each attack exploit?

A

Kerberoasting → TGS-REQ/TGS-REP (Ticket Granting Service).

AS-REP Roasting → AS-REQ/AS-REP (Authentication Service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s the common goal of both attacks?

A

Steal encrypted tickets, crack them offline, and reveal plaintext passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example Rubeus command for Kerberoasting:

A

Rubeus.exe kerberoast /outfile:hashes.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example Impacket command for AS-REP Roasting:

A

GetNPUsers.py DOMAIN/user -no-pass -dc-ip <IP> -outputfile hashes.txt</IP>

17
Q

How to protect against both attacks?

A

Use AES encryption (not RC4).

Enforce strong passwords for all accounts.

Enable pre-authentication for all users.

Monitor logs for suspicious TGS/AS-REQ activity.

18
Q

What Event ID tracks TGS requests (Kerberoasting)?

A

4769 (A Kerberos service ticket was requested).

19
Q

What Event ID tracks AS-REQ requests (AS-REP Roasting)?

A

4768 (A Kerberos authentication ticket was requested).

20
Q

What’s the #1 rule to prevent these attacks?

A

Strong passwords make offline cracking nearly impossible!