golden
kerberos::golden
can be used to forge golden and silver tickets. It can also be used for forging inter-realm trust keys. It has the following command line arguments:
/domain
: the active directory domain (the user's domain to impersonate)/sid
: the SID of the active directory domain the user's hash is hold/sids
: the extra SID of the domain to target during the SIDHistory spoofing/user
: username to impersonate, keep in mind that Administrator is not the only name for this well-known account/ticket
: save the ticket to a.kirbi
file/groups
: id of groups the user belongs (first is primary group, comma separator) - default is:513,512,520,518,519
for the well-known Administrators groups/id
: The user RID. The default value is 500 (local administrator)/target
- the server/computer name where the service is hosted (ex:share.server.local
,sql.server.local:1433
)/service
- The service name for the silver ticket (ex:cifs
,rpcss
,http
,mssql
)/ptt
: inject the generated golden ticket into memory/startoffset
: The start offset when the ticket is available. Default is 0/endin
: The ticket's minutes lifetime. The default value is 10 years. The default active directory kerberos policy is 10 hours/renewmax
: The maximum ticket's minutes lifetime renewal. The default value is 10 years. The default active directory kerberos policy is 7 days/krbtgt
: specify the krbtgt RC4 key/des
: the DES key to be used/rc4
: the RC4 key to be used/aes128
: The AES128 key to be used. More opsec safe/aes256
: the AES256 key to be used. More opsec safe/rodc
: for generating a golden ticket with the krbtgt hash of a Read Only Domain Controller
Golden Ticket
The following are the requirements for generating a golden ticket.
A KRBTGT key. It can be of type RC4 (i.e. NT hash), DES or AES (depending on what etypes the domain supports and what level of stealth the attacker wants).
Domain name
Domain SID
The username to impersonate
The RID of the user account to impersonate. The RID is the rightmost number in a full SID (e.g. 500 for the built-in administrator account)
The group RIDs the account should be a member of. The RID is the rightmost number in a full SID (e.g. 512 for "Domain Admins", 519 for "Entreprise Admins").
Sliver Ticket
The following are the requirements for generating a silver ticket.
Golden ticket & SIDHistory spoofing
When Forest Trust Relationship is bi-directional, it is possible to escalate from a child domain to a parent root domain by doing SIDHistory spoofing.
Inter-Realm Trust Tickets
To acquire the forest trust keys the command lsadump::trust /patch
has to be used. Depending on the forest trust relationship, using the trust key instead of the krbtgt account can be stealthier since most defense mechanisms are monitoring the krbtgt account.
Last updated