CRTP

Domain Enumeration

# Users
Get-DomainUser | select samaccountname

# Computers
Get-DomainComputer | select cn

# DAs
Get-DomainGroupMember -identity "Domain Admins" | select membername

# EAs
Get-DomainGroupMember -identity "Enterprise Admins" -domain <domain> | select membername

# SIDs
Get-DomainSID

# Collect BH data
SharpHound.exe -c all --zipfilename crtp_data --outputdirectory .\

Privilege Escalation

Forge a GT (pre-load SIDs on the initial TGT) (DA → EA):

The machine account can be combined with SIDs for DCs (516) and Enterprise DCs (S-1-5-9) to simulate legit replication behavior between domains (no 4672 alerts as above):

For even better OPSEC, Diamond Tickets instead of GT. These resemble legitimate Kerberos requests and include a corresponding TGT request, making them less suspicious:

Persistence

Forged TGT using krbtgt's creds → full domain impersonation.

Misc

Last updated

Was this helpful?