Golden Ticket Attack

Overview

When we compromise the krbtgt account, we will own the domain and be able to grant tickets however we want to. This allows us complete access to every machine in the domain.

We can use Mimikatz on the Domain Controller to pull this attack off

Golden Ticket Attack via Ticketer

First get domain sid (inside of DC shell)

Get-ADDomain PNPT.local

impacket-ticketer -nthash <krbtgt_ntlm_hash> -domain-sid <domain_sid> -domain <domain_name> <user_name>

Add the domain, hostnames etc to /etc/hosts file

You might have to change time for Kerberos to accept it

From nmap scan

Resource

Golden Ticket Attack via Mimikatz

In the Domain Controller shell

Note down the SID and NTLM hash of krbtgt account

Last updated

Was this helpful?