AD: Authenticated Enumeration

Real purpose of the technique

AS-REP Roasting

Enumeration and Exploitation

Manual Enumeration

The real goal is to find out everything about the Windows computer you've broken into (as an ethical hacker), without using any extra tools – just built-in commands like CMD and PowerShell.

Enumeration With BloodHound

How it works on real bounty targets

AS-REP Roasting

If the administrator sets “Do not require Kerberos preauthentication”, the attacker can steal the hash and crack the offline password.

Manual Enumeration

Do a manual enumeration to see admin accounts or services with old passwords

Enumeration With BloodHound

Main tools/commands + what they do