Skeleton Key
Last updated
Last updated
skeleton key does this by manipulating the way the encrypted timestamp (AS-REQ) is validated. in RC4 the timestamp is encrypted using NT hash of the user by the client, after which the domain controller attempts to decrypt the timestamp using the user NT hash. when the skeleton key is installed the domain controller will attempt to decrypt the timestamp using the user s NT hash and the skeleton key NT hash (which is 'mimikatz' by default for mimikatz tool).