Windows PtT
About Kerberos
Harvesting Kerberos Tickets
Method 1: Mimikatz sekurlsa::tickets module
Method 2: Rubeus dump module
Forging our own tickets(Overpass the Hash/PtKey)
Step1: Dump all user's Kerberos encryption keys with Mimikatz sekurlsa::ekeys module
Step2: Overpass the Hash
Method 1: Mimikatz + local admin privileges
Method2: Rubeus with non-admin user
Performing PtT Attack
Method 1: Rubeus asktgt module + hash + /ptt flag
Method 2: Rubeus + .kirbi file obtained from Mimikatz
Method 3: Rubeus + base64-encoded Ticket
Method 4: Mimikatz
Method 5: PS Remoting(5985/5986)
5.1 Using Mimikatz (Local Admin required)
5.2 Using Rubeus (No Admin privileges required)
Step 1: Create a Sacrificial Process
Doing it all with one tool:
Rubeus only
Step 1: Harvest Kerberos tickets from current session:
Step 2:
Mimikatz Only
Last updated