Skip to content

0xe7/RoastInTheMiddle

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Roast in the Middle is a rough proof of concept (not attack-ready) that implements a man-in-the-middle ARP spoof to intercept AS-REQ's to modify and replay to perform a Kerberoast or Sessionroast attack.

For more information about the kerberoast attack, read the blog post All Ur AS Are Belong To Us.

For more information about the sessionroast attack, read the blog post DES Is Useful... Sometimes

To run this proof of concept npcap needs to be installed on the machine and administrative privileges are required. This is because to perform the MitM it uses sharppcap.

Some of the code to decode Kerberos traffic is taken from Rubeus.

Arguments

All the following arguments are mandatory for both commands.

  • /listenip:IP - IP address to listen on
  • /targets:IP1,IP2... - IP addresses of targets to man-in-the-middle
  • /dcs:IP1,IP2... - IP addresses of domain controllers

This proof of concept will only be useful if the attack machine, targets and domain controllers are all on the same network segment due to the reliance on ARP spoofing, it could be modified to support a gateway for either the targets or DCs.

Commands

kerberoast

The following argument is mandatory for the kerberoast command.

  • /spns:SPNs - SPNs or usernames to kerberoast (can be a file or comma separated values)

sessionroast

The following argument is mandatory for the sessionroast command.

  • /tgt:[base64|FILE] - the TGT to use for the U2U requests

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages