Silver Ticket
Requirements:
1) SPN password NTLM hash
python3 -c "from passlib.hash import nthash; print(nthash.hash('YourPassword'))"echo -n 'YourPassword' | iconv -t UTF-16LE | openssl md42) Domain SID
Get-ADDomainrpcclient -U "user.name" -c "lsaquery" IP3) Target SPN (mssql/domain.local)
Get-ADUser -Filter {SamAccountName -eq "svc_mssql"} -Properties ServicePrincipalNames4) Kerberos modules installed on your machine
Steps:
1) Verify if the service you are authenticated runs in the context of the service user. If yes, you can impersonate the administrator!
2) Create ST
Linux
3) After crafting your ST, export the ccache file into krb5ccname
4) Adjust the krb5.conf by adding the target domain and realm by adding them as new entries with the corresponding format
TIP: If you have access to a service (MSSQL, for example) via port forward, DO NOT FORGET to set an extra /etc/hosts file entry with localhost
5) Authenticate with your crafted Silver Ticket
Last updated