Kerberos Golden Ticket Attack Explained

Поділитися
Вставка
  • Опубліковано 11 бер 2020
  • Taking a look at Kerberos "Golden Ticket" attacks with Mimikatz.
    As mentioned in the video, here's my DC Sync explanation: • DC Sync Attacks With S...
    My blog: vbscrub.com

КОМЕНТАРІ • 36

  • @isuggestthings9179
    @isuggestthings9179 Рік тому +7

    I will just say that this is one of the most underrated youtube channels around active directory that I've found. Great, GREAT Work mate, keep it up.

  • @MygenteTV
    @MygenteTV Рік тому

    by watching in your videos I learned more about AD then when I did the oscp

  • @SuperMarkusparkus
    @SuperMarkusparkus 4 роки тому

    Thank you VbScrub!

  • @jordicybersec323
    @jordicybersec323 10 місяців тому

    Best explanation ever! Thank you so much!

  • @DHIRAL2908
    @DHIRAL2908 4 роки тому +2

    Thanks! I learned many things today!

  • @mohammadaljaddua2962
    @mohammadaljaddua2962 Рік тому +2

    Thank you for your videos i really appreciate it, but also if you can for future videos show us how to see and detect them in the logs would be great

  • @rongrundy7943
    @rongrundy7943 4 роки тому

    Wonderful explanation

  • @brettnieman3453
    @brettnieman3453 4 роки тому

    great video! looking forward to your kerberos video. hopefully it will be a great compliment to Kelly Handerhan's :)

  • @272mahesh
    @272mahesh 3 роки тому +1

    Awesome video, Any idea how can we prevent these attacks?

  • @JohnDoe-pm2fm
    @JohnDoe-pm2fm Рік тому

    Perfectly explained...

  • @Guysudai1
    @Guysudai1 4 роки тому

    Amazing consistent content :) Did your box, was very cool learning about al**** st****

    • @vbscrub
      @vbscrub  4 роки тому +3

      glad you enjoyed. I've got another box being released in the next couple of weeks. Hope you find that one interesting too

    • @friktogurg9242
      @friktogurg9242 2 дні тому

      @@vbscrub Can i call KRBTGT account as keberos TGT account instead and still be correct? If exam question ask the name of the account? It means the same, doesn't it?

  • @eed5278
    @eed5278 4 роки тому

    Amazing!! Is kerberoasting in the list of future videos?

    • @vbscrub
      @vbscrub  4 роки тому +1

      Yeah the next video I'm doing is on kerberoasting and silver tickets :)

  • @securitytesting2701
    @securitytesting2701 Рік тому

    very good learning..

  • @frybait0626
    @frybait0626 13 днів тому

    How about meterpreter > kiwi ? How can I force the popup of the commandline after I execute the command kiwi_cmd "misc::cmd" ?

  • @Clutchisback1PC
    @Clutchisback1PC 4 роки тому +2

    I finally understand how to use this attack lol...the tip on /ptt and the tip on using the FQDN helped tremendously on understanding why my attempts in the past failed. i wasnt using kerberos authentication.

    • @vbscrub
      @vbscrub  4 роки тому +1

      yeah its not very intuitive, but once you know its not too bad :)

  • @jieliau9674
    @jieliau9674 Рік тому

    May I ask one question that I followed the steps and can see admin session using klist, But when I use net use to mount AD's C drive, the username/password is still prompt. Where can I check?

  • @CyberCelt.
    @CyberCelt. Рік тому

    Could you elaborate on the last bit where you say it can't be used using a remote shell please? I'm in that situation in the OSCP labs and I've struggled to understand when I've loaded a ticket how to use it given misc::cmd doesn't work but I guess it would work with gui access. I think this might be the reason. Not sure when we close Mimikatz is the ticket loaded into the reverse shell prompt too....

    • @vbscrub
      @vbscrub  Рік тому

      what I meant was that if you wanted to access files on that same machine you had the reverse shell on, then there's no kerberos authentication going on there becase kerberos only gets used when you access things across the network, so your ticket won't get used in that scenario. Obviously you are technically accessing those files over the network because you're using a reverse shell, but from the shell session's point of view (which is where you have your ticket) they would only be local files. Hope that makes sense.
      Oh and yeah anything you do in mimikatz is still in the same session as whatever you launched mimikatz from, so any tickets created/imported there still exist there after that. You can use the built in Windows command "klist" to check and see what tickets are cached in your current session wherever you are

  • @spotifyfan8084
    @spotifyfan8084 3 роки тому

    I understand that the TGT can be forget easily if you own the nltm hash of the krbtgt user, but what
    about the session key? i watched your video where you explain kerberos, and in the as-rep, the client gets back the tgt and a session key. Then for the tgs-req the session key obtained in as-rep is used to encrypt some data, so the question is here, when you get the as-rep back, as client, the session key will be encrypted with the clients password, and then this encrypted session key will be used to encrypt the data in the tgs-req. So an attacker can forge the tgt since its encrypted with the krbtgt ntlm hash but how can the attacker forge the session key? he obviously doesnt know the administrator's password, so how is that attack possible?

    • @robmarks6800
      @robmarks6800 3 роки тому

      As he said in the video you must actually have access to the admin account to perform this attack

  • @minhquan4115
    @minhquan4115 Рік тому

    if i set permission for that user then when i impacket_psexec i cant login to that user

  • @erandiherath1593
    @erandiherath1593 Рік тому

    Good

  • @freestylebeginner
    @freestylebeginner 4 роки тому

    I have a qn, shldnt we be looking at the AS-REP in wireshark that has the hashed krbtgt reply?

    • @vbscrub
      @vbscrub  4 роки тому

      I believe the password for the krbtgt account is randomly generated by AD during installation and is very long and complex, so it would take an extremely long time to crack (if you could even crack it at all). Having said that, it is possible for admins to reset the password to anything so I guess you could try it just in case they've reset it to something relatively simple, but in reality most of the time its going to be a waste of time.

    • @alejandroparrello6493
      @alejandroparrello6493 Рік тому

      @VbScrub hi! Just today I read in ms docs that no matter password you set, automatically windows generates a random one with same complexity... hope i help regards from Argentina 😉👋 hope

  • @subxi5744
    @subxi5744 Рік тому

    12:00 - in which part of the video you specify the 500 SID?

    • @vbscrub
      @vbscrub  Рік тому

      oh yeah it just defaults to that if you don't specify one. Same with the groups it adds you to (domain admins etc) if you don't specify group SIDs yourself

  • @falcon01-wafi82
    @falcon01-wafi82 3 роки тому

    How do you get secretsdump.py and download it?

  • @HarsikaMaduwanthi-kj2nn
    @HarsikaMaduwanthi-kj2nn Рік тому

    👍👍👍👍👍

  • @HarsikaMaduwanthi-kj2nn
    @HarsikaMaduwanthi-kj2nn Рік тому

    Dood