T1558.004 AS-REP Roasting

Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by Password Cracking Kerberos messages.(Citation: Harmj0y Roasting AS-REPs Jan 2017)

Preauthentication offers protection against offline Password Cracking. When enabled, a user requesting access to a resource initiates communication with the Domain Controller (DC) by sending an Authentication Server Request (AS-REQ) message with a timestamp that is encrypted with the hash of their password. If and only if the DC is able to successfully decrypt the timestamp with the hash of the user’s password, it will then send an Authentication Server Response (AS-REP) message that contains the Ticket Granting Ticket (TGT) to the user. Part of the AS-REP message is signed with the user’s password.(Citation: Microsoft Kerberos Preauth 2014)

For each account found without preauthentication, an adversary may send an AS-REQ message without the encrypted timestamp and receive an AS-REP message with TGT data which may be encrypted with an insecure algorithm such as RC4. The recovered encrypted data may be vulnerable to offline Password Cracking attacks similarly to Kerberoasting and expose plaintext credentials. (Citation: Harmj0y Roasting AS-REPs Jan 2017)(Citation: Stealthbits Cracking AS-REP Roasting Jun 2019)

An account registered to a domain, with or without special privileges, can be abused to list all domain accounts that have preauthentication disabled by utilizing Windows tools like PowerShell with an LDAP filter. Alternatively, the adversary may send an AS-REQ message for each user. If the DC responds without errors, the account does not require preauthentication and the AS-REP message will already contain the encrypted data. (Citation: Harmj0y Roasting AS-REPs Jan 2017)(Citation: Stealthbits Cracking AS-REP Roasting Jun 2019)

Cracked hashes may enable Persistence, Privilege Escalation, and Lateral Movement via access to Valid Accounts.(Citation: SANS Attacking Kerberos Nov 2014)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.PS-01.06 Encryption management practices Mitigates T1558.004 AS-REP Roasting
Comments
This diagnostic statement is associated with employing encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to the theft or forgery of kerberos tickets through AS-REP Roasting, enable AES Kerberos encryption (or another stronger encryption algorithm), rather than RC4, where possible.
References
    PR.PS-01.07 Cryptographic keys and certificates Mitigates T1558.004 AS-REP Roasting
    Comments
    This diagnostic statement protects against Steal or Forge Kerberos Tickets: AS-REP Roasting through the use of revocation of keys and key management. Employing key protection strategies for key material used in identity management and authentication processes, limitations to specific accounts along with access control mechanisms provides protection against adversaries trying to perform AS-REP Roasting.
    References
      PR.AA-01.01 Identity and credential management Mitigates T1558.004 AS-REP Roasting
      Comments
      This diagnostic statement protects against AS-REP Roasting through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
      References
        PR.PS-01.05 Encryption standards Mitigates T1558.004 AS-REP Roasting
        Comments
        This diagnostic statement is associated with employing strong encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address threats to the theft or forgery of kerberos tickets through AS-REP Roasting, enable AES Kerberos encryption (or another stronger encryption algorithm), rather than RC4, where possible.
        References

          NIST 800-53 Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          CA-07 Continuous Monitoring mitigates T1558.004 AS-REP Roasting
          CM-06 Configuration Settings mitigates T1558.004 AS-REP Roasting
          IA-05 Authenticator Management mitigates T1558.004 AS-REP Roasting
          AC-17 Remote Access mitigates T1558.004 AS-REP Roasting
          SA-15 Development Process, Standards, and Tools mitigates T1558.004 AS-REP Roasting
          AC-19 Access Control for Mobile Devices mitigates T1558.004 AS-REP Roasting
          SC-04 Information in Shared System Resources mitigates T1558.004 AS-REP Roasting
          SI-12 Information Management and Retention mitigates T1558.004 AS-REP Roasting
          RA-05 Vulnerability Monitoring and Scanning mitigates T1558.004 AS-REP Roasting
          SI-03 Malicious Code Protection mitigates T1558.004 AS-REP Roasting
          SI-07 Software, Firmware, and Information Integrity mitigates T1558.004 AS-REP Roasting
          AC-16 Security and Privacy Attributes mitigates T1558.004 AS-REP Roasting
          AC-18 Wireless Access mitigates T1558.004 AS-REP Roasting
          CM-02 Baseline Configuration mitigates T1558.004 AS-REP Roasting
          CM-02 Baseline Configuration mitigates T1558.004 AS-REP Roasting
          SA-11 Developer Testing and Evaluation mitigates T1558.004 AS-REP Roasting
          IA-02 Identification and Authentication (Organizational Users) mitigates T1558.004 AS-REP Roasting
          SI-04 System Monitoring mitigates T1558.004 AS-REP Roasting
          AC-02 Account Management mitigates T1558.004 AS-REP Roasting
          AC-03 Access Enforcement mitigates T1558.004 AS-REP Roasting

          VERIS Mappings

          Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
          action.hacking.variety.Exploit misconfig Exploit a misconfiguration (vs vuln or weakness) related-to T1558.004 AS-REP Roasting
          action.hacking.variety.Use of stolen creds Use of stolen or default authentication credentials (including credential stuffing) related-to T1558.004 AS-REP Roasting
          action.malware.variety.Exploit misconfig Exploit a misconfiguration (vs vuln or weakness) related-to T1558.004 AS-REP Roasting