Accessing ASRepCatcher
Navigate to LAYER2 → ASRepCatcher in the sidebar. The panel provides mode selection, interface selection, start/stop controls, and a live output terminal.Installation
ASRepCatcher is installed bysetup.sh in its own isolated virtual environment:
400 error with the message ASRepCatcher not found at <path>. Run setup.sh first.
The venv includes these packages (installed by setup.sh):
scapy— raw packet capture and injectionasn1— ASN.1 parsing for Kerberos structuressetuptoolstermcolor— colored terminal outputnetifaces— network interface enumeration
ASRepCatcher is cloned from https://github.com/Yaxxine7/ASRepCatcher during
setup.sh. The venv is separate from the main application venv to avoid dependency conflicts.Modes
relay
ASRepCatcher intercepts AS-REQ packets, relays them to the real KDC, and captures the AS-REP hashes returned. Active mode — does not require pre-existing Kerberos traffic.
listen
ASRepCatcher passively sniffs AS-REP packets already on the wire. Requires that AS-REQ/AS-REP exchanges are visible on the monitored interface (e.g. on a hub or SPAN port).
Starting ASRepCatcher
Select a network interface
Choose the interface to capture on. Optional — if not provided, ASRepCatcher uses its default interface selection. The interface is recorded in the session metadata.
Click Start
The UI calls
POST /api/asrepcatcher/start, which builds the command, launches the process in the background, logs the session to scan history, and registers the PID in the ASREPCATCHER_PROCESSES global dict.Start request
mode defaults to "relay" if not specified. The options array accepts additional ASRepCatcher flags as individual strings.
Stopping ASRepCatcher
Click Stop in the UI, or call the stop endpoint. The backend runssudo pkill -f 'ASRepCatcher' to terminate all ASRepCatcher processes and marks the scan as completed in scan history.
Live output streaming
Output is written torecon/asrepcatcher_<timestamp>.txt and read incrementally:
| Field | Description |
|---|---|
content | New bytes read since offset |
file_size | Current file size in bytes |
Checking process status
ASREPCATCHER_PROCESSES dict (keyed by PID) is the authoritative in-memory state. Each entry stores the process handle, output file path, interface, mode, start time, and scan ID.
Output file
Each session writes to a timestamped file in therecon/ directory:
Credentials database
Captured AS-REP hashes are stored in the credentials database. A backgroundmonitor_asrepcatcher_output task watches the output file for new content. Captured hashes appear in DATA → Credentials and are available in authenticated scan dropdowns for use in subsequent attacks.
Use with Kerberoast workflow
AS-REP hashes captured by ASRepCatcher are Kerberos pre-authentication responses that can be cracked offline. The typical workflow:Capture AS-REP hashes
Run ASRepCatcher in relay or listen mode during a period when Kerberos authentication is active on the network (e.g. user logons, machine reboots).
Review captured hashes
Check DATA → Credentials and filter by source. Hashes appear in Hashcat format suitable for cracking with
-m 18200 (Kerberos 5, etype 23 AS-REP).