Diamond Ticket
The Diamond Ticket attack allows red teamers to manipulate a legitimate Kerberos Ticket Granting Ticket (TGT) by decrypting it, modifying its contents (e.g., user, groups, SID), and then re-encrypting it using the krbtgt account’s NTLM or AES key. The result is a TGT that retains all the metadata and timing of a valid, DC-issued ticket — but with attacker-controlled privileges. This makes it significantly more stealthy than a Golden Ticket.

Unlike Golden Tickets, which are forged entirely from scratch, Diamond Tickets start with a valid TGT obtained through a legitimate Kerberos authentication flow. This distinction matters: Golden Tickets skip the initial AS-REQ/AS-REP exchange with the DC, which some EDR solutions and KDC auditing logs can flag as suspicious. Diamond Tickets, on the other hand, leave behind clean traces — the TGT issuance is genuine — making post-exploitation activity more OPSEC-safe.
To perform the attack the user's credentials (password or hash) are needed to request the initial TGT as well as the krbtgt account’s key to decrypt and re-encrypt the TGT.
An alternative to using the user’s credentials directly is leveraging an existing delegated TGT via the /tgtdeleg option — useful if a domain user account is already compromised.
Last updated
Was this helpful?