Kerberos Silver Ticket Attack Explained

Поділитися
Вставка
  • Опубліковано 14 лис 2021
  • I'm finally back and continuing with the Kerberos videos I promised you ages ago. This time we're looking at the silver ticket attack, which lets us pretend to be domain admin for a specific service.
    Here are the previous videos I mentioned:
    Kerberos explained: • Kerberos Explained (In...
    Kerberoasting: • Impacket GetUserSPNs &...
    Golden ticket attack: • Kerberos Golden Ticket...
    Tools I mentioned:
    Rubeus: github.com/GhostPack/Rubeus
    The Rubeus GUI I'm working on: github.com/VbScrub/Rubeus-GUI
    My GetDomainSID tool: github.com/VbScrub/GetDomainSID
  • Наука та технологія

КОМЕНТАРІ • 30

  • @vbscrub
    @vbscrub  2 роки тому +3

    Here are the previous videos I mentioned:
    Kerberos explained: ua-cam.com/video/snGeZlDQL2Q/v-deo.html
    Kerberoasting: ua-cam.com/video/xH5T9-m9QXw/v-deo.html
    Golden ticket attack: ua-cam.com/video/o98_eRt777Y/v-deo.html
    Tools I mentioned:
    Rubeus: github.com/GhostPack/Rubeus
    The Rubeus GUI I'm working on: github.com/VbScrub/Rubeus-GUI
    My GetDomainSID tool: github.com/VbScrub/GetDomainSID

  • @rafster15able
    @rafster15able 2 роки тому +5

    you don't know how much I appreciate your content, it's amazing... not only your way of explaining but the simplicity with which you do it, thanks Vbscrub!

    • @vbscrub
      @vbscrub  2 роки тому +2

      Always nice to hear, thanks!

  • @hexrays6150
    @hexrays6150 2 роки тому +4

    Good explanation, thanks! Also your voice and video editing is chilling and enjoyable.

    • @vbscrub
      @vbscrub  2 роки тому +2

      thanks, glad to hear that

  • @null_1065
    @null_1065 2 роки тому +2

    Good to see you back VBScrub!

  • @papahorse3347
    @papahorse3347 2 роки тому +1

    im learning to the oscp exam, and your realy helping me ty so much i realy love they way you explain!

  • @fabiorj2008
    @fabiorj2008 2 роки тому +2

    By the way, your videos about windows are amazing,.

  • @DHIRAL2908
    @DHIRAL2908 2 роки тому +1

    Welcome back, mate!

  • @MonnizProductions
    @MonnizProductions Рік тому

    This video is not in the tutorials playlist of yours.
    Thanks for all the videos!

  • @huplim
    @huplim 2 роки тому +1

    Awesome stuff!

  • @mattlebutter9162
    @mattlebutter9162 2 роки тому

    Welcome back!

  • @SuperAtmosphere
    @SuperAtmosphere Рік тому

    Very informative, If you can complete the gui tool on the golden ticket , that’s something cool

    • @vbscrub
      @vbscrub  Рік тому

      yeah sorry, I actually did like 99% of the work to get the golden ticket part of the tool working but then just never got round to fully testing it so wasn't comfortable with releasing it

  • @ltownandfriends4531
    @ltownandfriends4531 Рік тому

    thanks, very helpful

  • @MygenteTV
    @MygenteTV Рік тому

    thank you

  • @xB-yg2iw
    @xB-yg2iw 2 роки тому

    helpful for your new box thanks :p

    • @vbscrub
      @vbscrub  2 роки тому

      haha shhh no spoilers

  • @gr00t8
    @gr00t8 2 роки тому

    Is that something that you found regularly during assessments? (User accounts with weak passwords instead of GMSA)

  • @mhnnamadi495
    @mhnnamadi495 Рік тому

    i tested this method but i couldn't access to plain text with hashcat has it another way to access to silver ticket without hash crack?

  • @haireeizzam6349
    @haireeizzam6349 Рік тому

    If I am able to crack the service account hash via kerberoasting and authenticate to the sqlservice, what's the purpose of creating a "fake account" that enable us to log in into the sql service?

  • @hb3643
    @hb3643 3 місяці тому

    Thx

  • @rafakaras790
    @rafakaras790 2 роки тому

    I tried to reproduce the steps you did in this video but I cannot login from remote computer. Did you use stock MSSQL configuration or you had to setup MSSQL?

    • @vbscrub
      @vbscrub  2 роки тому

      I think all I did was enable TCP connections in the SQL connection manager thing and allow the SQL port through the windows firewall on the server

  • @fabiorj2008
    @fabiorj2008 2 роки тому +1

    Would you tell us a machine in HTB that can apply the knowledge learn in this video ?

    • @vbscrub
      @vbscrub  2 роки тому +2

      I've seen kerberoasting in a few HTB machines (one called Active) but haven't actually seen silver tickets in any of the ones I've done. Bear in mind I've only done about 15 HTB machines though

    • @jeanbaptistebrossard8148
      @jeanbaptistebrossard8148 11 місяців тому

      Scrambled

  • @yaseen7749
    @yaseen7749 Рік тому

    Easy way to find sid "whoami /user" good explanation though

    • @vbscrub
      @vbscrub  Рік тому

      if you're running a reverse shell on a domain joined machine sure, but this is obviously not for that scenario