ask

kerberos::ask can be used to obtain Service Tickets. The Windows native command is klist get. It has the following command line arguments:

  • /tkt: save the ST (Service Ticket) to a .tkt file

  • /export : export the TGS to a .kirbi file

  • /rc4 : use an RC4 key

  • /des : use a DES key

  • /aes256 : use an AES256 key (it is the default key)

  • /aes128 : use an AES128 key

  • /target : The target SPN/FQDN

  • /nocache: tells Mimikatz not to cache the ticket in the current session

mimikatz # kerberos::ask 0-40e10000-m3g9tr0n@krbtgt~HACKLAB.LOCAL-HACKLAB.LOCAL.kirbi /target:CIFS/dc.hacklab.local
Asking for: CIFS/dc.hacklab.local
   * Ticket Encryption Type & kvno not representative at screen

           Start/End/MaxRenew: 18/11/2021 01:47:30 ; 18/11/2021 11:47:30 ; 25/11/2021 01:47:30
           Service Name (02) : CIFS ; dc.hacklab.local ; @ HACKLAB.LOCAL
           Target Name  (02) : CIFS ; dc.hacklab.local ; @ HACKLAB.LOCAL
           Client Name  (01) : m3g9tr0n ; @ HACKLAB.LOCAL
           Flags 40a50000    : name_canonicalize ; ok_as_delegate ; pre_authent ; renewable ; forwardable ;
           Session Key       : 0x00000012 - aes256_hmac
             9905bb3a8b7b45f9c841983c7a7e3e0c0cc197e879fd6933a70f29227c6c8e21
           Ticket            : 0x00000012 - aes256_hmac       ; kvno = 0        [...]

Check if the ST was injected in the current session:

Request a ST for HTTP/dc.hacklab.local with an RC4 key:

Last updated