Cybersecurity glossaryAttack catalog
AS-REP Roasting Attack - How It Works and Defense Strategies

AS-REP Roasting Attack - How It Works and Defense Strategies

AS-REP Roasting is a Kerberos-based credential harvesting technique that targets accounts configured without Kerberos pre-authentication. An attacker can request an AS-REP for such an account, receive data encrypted with the account’s long-term key, and crack that encrypted blob offline to recover the plaintext password. Because the attack uses standard Kerberos flows and offline cracking, it is stealthy and effective against weak or static passwords.

Attribute

Details

Attack Type

AS-REP Roasting (Kerberos credential extraction)

Impact Level

High

Primary Attack Vector

Accounts with “Do not require Kerberos pre-authentication” set; LDAP enumeration; network access to KDC

Motivation

Credential theft, lateral movement, privilege escalation, persistence

Common Prevention Methods

Enforce Kerberos pre-authentication, strong/long passwords, disable legacy accounts, monitor Kerberos activity, MFA, account hardening

Risk Factor

Level

Potential Damage

High — compromised credentials may enable lateral movement and privilege escalation

Ease of Execution

Medium — requires enumeration of target accounts and offline cracking resources

Likelihood

Medium to High in environments with legacy/configuration gaps

What is AS-REP Roasting?

Kerberos normally requires pre-authentication: the client must prove its identity to the Key Distribution Center (KDC) before the KDC issues a Ticket Granting Ticket (TGT). If an account is configured to skip pre-authentication (the “Do not require Kerberos pre-authentication” setting), an attacker can send an AS-REQ for that account and the KDC will return an AS-REP containing data encrypted with the account’s long-term key (derived from its password). The attacker extracts that encrypted blob and performs offline password cracking against it — if the password is weak, the attacker recovers it and can then authenticate as the account. This technique is known as AS-REP Roasting.

How Does AS-REP Roasting Work?

Below is a step-by-step breakdown of a typical AS-REP Roasting attack.

1. Reconnaissance — find accounts without pre-authentication

Attackers enumerate directory accounts to find users or service principals with Kerberos pre-authentication disabled ("Do not require Kerberos pre-authentication"). These are often legacy service accounts, computer accounts, or misconfigured user accounts. Enumeration is performed via LDAP/AD queries or reconnaissance tooling.

2. Request AS-REP for target accounts

For each discovered account, the attacker sends an AS-REQ to the domain KDC for that username. Because pre-authentication is disabled, the KDC returns an AS-REP containing data encrypted with the account’s password-derived key.

3. Extract the encrypted blob

The attacker extracts the encrypted portion of the AS-REP response (the encrypted timestamp or encrypted part of the ticket) and formats it for offline cracking.

4. Crack the key offline

Using offline password-cracking tools (GPU-accelerated or distributed cracking), the attacker attempts to recover the password via brute force, dictionaries, or targeted candidate lists. Weak or static passwords are vulnerable.

5. Use recovered credentials for lateral movement & persistence

Once the password is recovered, the attacker can authenticate as that account, move laterally, access services, or escalate privileges. Service and machine accounts often have broad access, increasing impact.

✱ Variant: Targeting machine/service principals and long-lived accounts

AS-REP Roasting frequently targets non-interactive accounts (service principals, computer accounts) that were configured without pre-authentication for compatibility. These accounts often have long, static passwords and broad access, making them high-value targets.

Attack Flow Diagram

Image

Example: Organization Perspective

An attacker scans Contoso’s AD and finds several legacy backup service accounts marked "no pre-auth" for compatibility with an old appliance. The attacker requests AS-REPs for those accounts, extracts the encrypted responses, and cracks a weak password offline. Using the recovered credential, the attacker accesses backup shares and domain resources, then escalates further by exploiting misconfigured group memberships

Examples & Real-World Patterns

Case

Impact

Legacy backup/service accounts

Attackers harvest credentials from service accounts configured without pre-auth, enabling data access and lateral movement.

Automated scanning in pentests

Red teams frequently include AS-REP checks to identify legacy exposure and weak password risks.

Consequences of AS-REP Roasting

AS-REP Roasting can produce broad impacts if the compromised account has privileged access or access to sensitive data.

Financial Consequences

Compromise of service accounts can lead to theft of IP, customer data, or financial records, potentially triggering fines, remediation costs, or ransom demands.

Operational Disruption

An attacker using service credentials can access backups, alter scheduled tasks, or disrupt critical services, leading to outages and recovery costs.

Reputational Damage

Public disclosure of a domain compromise — especially if customer data or availability is affected — damages trust and can hamper partnerships.

Legal and Regulatory Impact

Exposure of regulated data may trigger GDPR, HIPAA, PCI, or other compliance investigations and fines.

Impact Area

Description

Financial

Data theft, fraud, extortion, remediation costs

Operational

Service outages, backup tampering, recovery workload

Reputational

Customer/partner trust erosion

Legal

Regulatory penalties, breach notifications

Common Targets: Who is at risk?

Accounts with pre-authentication disabled

Legacy service accounts, compatibility accounts for old appliances

Non-interactive service principals

Static passwords and long-lived credentials

Accounts with weak or unrotated passwords

High cracking risk

Large estates with poor account hygiene

Many legacy systems and misconfigurations

Risk Assessment

Risk Factor

Level

Potential Damage

High — credentials can enable domain pivoting and data exfiltration.

Ease of Execution

Medium — requires AD enumeration and offline cracking resources.

Likelihood

Medium to High — many enterprises retain legacy/compatibility accounts.

How to Prevent AS-REP Roasting

Prevention is straightforward conceptually but requires consistent account hygiene and configuration controls.

Enforce Kerberos pre-authentication

Enable Kerberos pre-authentication for all accounts unless absolutely required for legacy functionality. Minimize and justify any accounts configured to skip pre-auth.

Harden account passwords & lifecycle

Use long, randomly generated passwords for service and machine accounts, rotate passwords regularly (gMSAs where possible), and avoid storing secrets in plaintext.

Replace legacy patterns

Migrate legacy applications to support modern authentication or use dedicated, isolated service accounts with constrained access and frequent rotation. Prefer Kerberos constrained delegation where applicable.

Apply least privilege & segmentation

Limit the privileges of service accounts and isolate legacy systems via network segmentation.

Use MFA & Conditional Access

Require MFA and conditional access for interactive admin workflows. Note that AS-REP targets non-interactive accounts, so MFA is part of defense-in-depth rather than a direct mitigation for all cases.

How Netwrix Helps Defend Against AS-REP Roasting

Netwrix Identity Threat Detection & Response (ITDR) strengthens your defenses by continuously monitoring Active Directory and Microsoft Entra ID for risky account configurations, including those vulnerable to AS-REP Roasting. With real-time alerts on suspicious Kerberos activity, LDAP reconnaissance, or abnormal authentication attempts, ITDR enables security teams to act before attackers can crack service account credentials. By combining proactive detection with automated response workflows, Netwrix helps organizations minimize lateral movement opportunities and close the identity gaps that adversaries exploit.

Detection, Mitigation and Response Strategies

Detection

  • Monitor AD queries and LDAP enumeration for scans that list account flags or query for pre-auth disabled attributes.
  • Log and alert on excessive AS-REQ/AS-REP exchanges for accounts that normally should not be requested from unusual sources.
  • Inventory accounts with pre-auth disabled and flag unexpected changes; maintain baseline.
  • Honeypots/honey accounts: create decoy no-preauth accounts and monitor for AS-REP requests.
  • Watch for signs of credential use after cracking: unusual logins, resource access, or lateral auth patterns.

Response

  1. Immediately rotate or disable exposed accounts if you detect suspicious AS-REP activity.
  2. Enable pre-authentication, rotate passwords, and replace with managed identities where possible.
  3. Conduct credential hunts for signs of recovered credential use and perform scope/impact assessments.
  4. Block attacker infrastructure at network level if identified and feasible.

Mitigation

  • Eliminate accounts that require no pre-auth where feasible, or isolate and harden them.
  • Introduce automated detection (SIEM rules) for LDAP enumeration, AS-REQ spikes, and AS-REP hits against decoy accounts.
  • Integrate secret scanning in CI/CD to prevent accidental credential leakage.

Industry-Specific Impact

Industry

Impact

Healthcare

Compromised backup/service accounts could expose EHR backups and PHI.

Finance

Access to transaction systems or reporting servers can lead to fraud or data theft.

Government

Exposure of service credentials risks sensitive system access and national security data.

  • GPU acceleration & cloud cracking make offline password recovery faster and cheaper.
  • Automated reconnaissance integrates AD enumeration and AS-REP requests into multi-stage campaigns.
  • Shift to managed identities reduces exposure where implemented, pushing attackers toward legacy/high-value targets.
  • Use of AI to prioritize cracking — attackers may apply ML to pick best candidate passwords.

Key Statistics & Infographics (suggested telemetry)

  • Percent of accounts with pre-authentication disabled in your environment.
  • Average password age for service accounts.
  • Time to crack common password classes on available cracking hardware (for risk modeling).

Final Thoughts

AS-REP Roasting is effective and low-noise, preying on configuration gaps and weak credential hygiene. Eliminating pre-auth disabled accounts, enforcing managed secrets, and monitoring Kerberos/AD enumeration are the most effective defenses.

FAQs

Share on

View related cybersecurity attacks

Abusing Entra ID Application Permissions – How It Works and Defense Strategies

AdminSDHolder Modification – How It Works and Defense Strategies

Kerberoasting Attack – How It Works and Defense Strategies

Hafnium Attack - How It Works and Defense Strategies

DCSync Attacks Explained: Threat to Active Directory Security

Golden SAML Attack

Understanding Golden Ticket Attacks

Group Managed Service Accounts Attack

DCShadow Attack – How It Works, Real-World Examples & Defense Strategies

ChatGPT Prompt Injection: Understanding Risks, Examples & Prevention

NTDS.dit Password Extraction Attack

Pass the Hash Attack

Pass-the-Ticket Attack Explained: Risks, Examples & Defense Strategies

Password Spraying Attack

Plaintext Password Extraction Attack

Zerologon Vulnerability Explained: Risks, Exploits and Mitigation

Active Directory Ransomware Attacks

Unlocking Active Directory with the Skeleton Key Attack

Lateral Movement: What Is It, How It Works And Preventions

Man-in-the-Middle (MITM) Attacks: What They Are & How to Prevent Them

Why Is PowerShell So Popular for Attackers?

4 Service Account Attacks and How to Protect Against Them

How to Prevent Malware Attacks from Impacting Your Business

What is Credential Stuffing?

Compromising SQL Server with PowerUpSQL

What Are Mousejacking Attacks, and How to Defend Against Them

Stealing Credentials with a Security Support Provider (SSP)

Rainbow Table Attacks: How They Work and How to Defend Against Them

A Comprehensive Look into Password Attacks and How to Stop Them

LDAP Reconnaissance

Bypassing MFA with the Pass-the-Cookie Attack

Silver Ticket Attack