Kerberos



Pass-the-Ticket (PtT)
This attack uses stolen Kerberos tickets (TGTs or service tickets) to authenticate to services without needing the user's password or hash.
Extracting Kerberos Tickets
Use Mimikatz to export Kerberos tickets from memory:
Using Extracted Tickets
Load and use a specific Kerberos ticket for authentication:
Pass-the-Key (PtK)
This attack uses extracted session keys (RC4, AES128, or AES256) instead of passwords to authenticate as a user. It’s a more versatile extension of the Pass-the-Hash (PtH) attack.
Extracting Session Keys
Retrieve encryption keys (RC4, AES128, AES256) from memory:
Using Extracted Keys
Launch processes using extracted session keys for authentication.
If RC4 Key (Equivalent to NTLM Hash):
If AES128 Key:
If AES256 Key:
Overpass-the-Hash (OPtH)
Concept:
RC4 keys are equivalent to the NTLM hash of a user.
If the NTLM hash is available, it can be used to request a Ticket Granting Ticket (TGT), provided RC4 is an enabled encryption protocol.
Key Details:
NTLM hash = RC4 key.
Used to perform Kerberos authentication without needing the original password.
Last updated