If a user doesn’t have Kerberos pre-authentication required on their account, authentication can be requested from the DC without credentials. This results in a message that can be cracked to get the user’s password.
🔍 Discovery
Requirements:
a connection to the DC
Lack of Kerberos pre-authentication
Domain account - optional but preferred
If attempting the attack unauthenticated, you’ll need to guess valid usernames, in labs like HTB this is a good technique to try if you’re able to find employee usernames on a website, etc. username-anarchy is a great tool for this.
If authenticated you can enumerate vulnerable users that don’t have Kerberos pre-authenticated required from LDAP:
Windows:
Linux:
📌 Exploitation
Windows:
Linux:
If you encounter a Kerberos clock skew error, try this fix.
✨ Post-Exploitation
Once an AS-REP hash is obtained, it can be cracked using hashcat to obtain the user’s password.