Kerberos

Pass-the-Ticket (PtT)

This attack uses stolen Kerberos tickets (TGTs or service tickets) to authenticate to services without needing the user's password or hash.

  1. Extracting Kerberos Tickets

    • Use Mimikatz to export Kerberos tickets from memory:

  2. Using Extracted Tickets

    • Load and use a specific Kerberos ticket for authentication:


Pass-the-Key (PtK)

This attack uses extracted session keys (RC4, AES128, or AES256) instead of passwords to authenticate as a user. It’s a more versatile extension of the Pass-the-Hash (PtH) attack.

  1. Extracting Session Keys

    • Retrieve encryption keys (RC4, AES128, AES256) from memory:

  2. Using Extracted Keys

    • Launch processes using extracted session keys for authentication.

    • If RC4 Key (Equivalent to NTLM Hash):

    • If AES128 Key:

    • If AES256 Key:


Overpass-the-Hash (OPtH)

  • Concept:

    • RC4 keys are equivalent to the NTLM hash of a user.

    • If the NTLM hash is available, it can be used to request a Ticket Granting Ticket (TGT), provided RC4 is an enabled encryption protocol.

  • Key Details:

    • NTLM hash = RC4 key.

    • Used to perform Kerberos authentication without needing the original password.

Last updated