Golden Ticket with krbtgt
Requirement:
Env -> domain controller
This attack assumes a Domain Controller compromise where
KRBTGTaccount hash will be extracted which is a requirement for a successful Golden Ticket attack.
https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/golden-ticket
Sample extract krbtgt's account hash:
mimikatz # lsadump::lsa /inject /name:krbtgtGolden Ticket Attack from Windows
Inject golden ticket to memory:
check the ticket with klist
Once you have the golden Ticket injected, you can access the shared files (C$), and execute services and WMI, so you could use psexec or wmiexec to obtain a shell (looks like yo can not get a shell via winrm).
switching back to the console the attacker used to create the golden ticket (local admin) and again attempting to access c$ share of the domain controller - this time is a success:
or Execute a cmd in the remote machine with PsExec:
reference:
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/kerberos-golden-tickets#execution https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/golden-ticket
Golden Ticket Attack from Linux
Requirement:
krbtgt hash

Domain SID

Convert TGT Windows and Linux Format
https://github.com/Zer1t0/ticket_converter
To convert tickets between Linux/Windows format with ticket_converter.py:
Last updated


