AS-REP Roasting: When Pre-Auth Is Off and the Hash Is Free

📰 Medium · Cybersecurity

Learn about AS-REP Roasting, a dangerous cybersecurity threat that exploits pre-auth vulnerabilities, and why it matters for security professionals

intermediate Published 17 Apr 2026
Action Steps
  1. Identify systems with pre-auth disabled
  2. Use tools like Hashcat or John the Ripper to extract and crack AS-REP hashes
  3. Configure systems to require authentication for AS-REP requests
  4. Test systems for AS-REP Roasting vulnerabilities
  5. Implement additional security measures like multi-factor authentication to prevent hash extraction
Who Needs to Know This

Security teams and penetration testers benefit from understanding AS-REP Roasting to identify and mitigate pre-auth vulnerabilities in their systems

Key Insight

💡 AS-REP Roasting can be used to extract and crack hashes when pre-auth is off, making it a significant security risk

Share This
🚨 AS-REP Roasting: a stealthy cybersecurity threat that exploits pre-auth vulnerabilities 🚨
Read full article → ← Back to Reads