Pass The Ticket
Last updated
Last updated
In a pass the ticket attack access is gained to a resource of a system (for example the administrative shares) using a Kerberos ticket that was generated or obtained from a compromised machine (TGT or TGS)
PtT affects all windows platforms relying on kerberos.
run these in mimikatz:
we have the tickets that were saved inside the directory where we had the mimikatz executable.
We go back to the mimikatz terminal. Here, we pass the ticket with the help of ptt module inside the Kerberos module followed by the name of the ticket that we want to pass.to perform the actions as the user that we passed the ticket for we decided to get a cmd as that user. This can be accomplished using the misc::cmd command as shown in the image given below.
rubeus is a C# toolset for raw Kerberos interaction and abuses.
we will use extract the tickets using Rubeus. This can be done with the help of the asktgt module. Although it is not so sneaky method it gets the work done. We need the domain name, User, Password Hash. When used normally will give the base64 encoded TGT ticket. But Letβs Pass the Ticket as well in the same step
or pass the ticket with kirbi file:
now we have the ticket for user administrator and we can access shares:
or get shell access: