we can use a technique called ASREPRoasting, meaning if a user does not have the Kerberos preauthentication property selected it is possible to retrieve the password hash from that user. this tool which can query the AD and if the property above is not selective it will export their TGT.
Retrieving Kerberos Tickets hat will allow us to query ASReproastable accounts from the Key Distribution Center. The only thing that's necessary to query accounts is a valid set of usernames which we enumerated previously via Kerbrute.
WARNING / Legal: This tool interacts with Active Directory and authentication services. Do not run it against systems you do not own or do not have explicit written permission to test. The author is not responsible for misuse.
Run GetNPUsers.py against a list of accounts, stream output, and make success indicators obvious by printing them in color and saving findings to a local artifact file for later review.
- ANSI-colored results (choose green/red for success)
- Detects
$krb5asrep$23$, "getting its TGT",AS-REP,NTLMand other patterns - Takes users via embedded list or
--users-file --getnp,--domain,--extra-flags, and--timeoutoptions- Logs per-run output to
logs/and appends artifacts tofound_results.txt
- Python 3 (for the Python runner)
GetNPUsers.pyfrom Impacket (make sure it's installed and available)- Bash (for the Bash script)
- Terminal that supports ANSI colors (for colored output)
# example with included Python script
python3 Check_GetNPUsers.py --domain spookysec.local --success-color red