Golden Tickets
Last updated
Last updated
#impacket #mimikatz
TGTs are encrypted with the krbtgt
's key derived from it's password.
krbtgt
account password is not rotated automatically. Microsoft's best practice is to rotate every 6 months, which is more than enough time to maintain persistence.
Password history for krbtgt
account is maintained by the DC.
If we get hold of this key, we can forge TGTs for any user subsequently getting access to any service as any user. These tickets are called Golden Tickets.
This can be done using dumping credential of the domain controller or via attack.
This can also be done by dumping the NTDS.dit file locally.
Using impacket's secretsdump.py:
AES256 keys should be used to avoid any alerts or detection.
AES keys for krbtgt
account can also be obtained by performing