Golden Ticket
Golden Tickets (GTs) are forged Kerberos TGTs created using the password hash of the krbtgt
domain account. Possession of this hash allows attackers to impersonate any user, including Domain Admins
, across the entire AD domain. This method enables persistent and stealthy privilege escalation without relying on service-specific credentials like Silver Tickets (STs). The krbtgt hash rarely changes, making Golden Tickets a durable attack vector.
In our scenario, we will attemp to move laterally as jen
from CLIENT74
to DC1
via PsExec
.
To extract the NTML hash of the krbtgt
account we will log into the DC1
as jeffadmin
who is a Domain Admin
.
Creating the GT and inject it into memory does not require elevated privileges and can also be performed via a host not joined on the domain. We will need the domain SID (which we can obtain via whoami /user
) and the krbtgt hash.
The
misc::cmd
command in Mimikatz launches a newcmd.exe
session that uses the current Mimikatz security context, including any injected Kerberos tickets, ensuring the forged Golden Ticket is applied for authentication in subsequent commands.
This attack is a form of Overpass-the-Hash using Kerberos. If PsExec
is run using an IP address instead of hostname (forcing NTLM), access fails.
Last updated
Was this helpful?