Pass-the-Ticket
The Pass-the-Ticket (PtT) attack exploits Kerberos TGS to impersonate users and access resources across a network. Unlike the TGT, which is machine-bound, TGS can be extracted from memory and re-injected into another session. If TGS tickets belong to the current user, no administrative privileges are needed. This allows attackers to bypass standard access controls by injecting valid Kerberos tickets into their own session.
TGT vs TGS: TGT tickets are used to request service tickets from the KDC and are valid only on the machine they were generated on, while TGS tickets are for accessing specific services and can be reused across machines if extracted.
Attack Premise: Reuse another user's TGS by extracting it from LSASS memory and injecting it into the current session. Does not require local admin rights if using the current user’s own tickets.
In our scenario, dave
has privileged access to the backup
folder on WEB04
, but the compromised user, jen
, does not.
First, we want first to extract all tickets from LSASS. mimikatz
will dump them all to .kirbi
files.
We can inspect the dumped ticket files and confirm that a TGS for dave
accessing web04
exists.
We can then inject dave
's WEB04
TGS into jen
's session in order to access the backup
folder.
Last updated
Was this helpful?