Тёмный

Kerberos Golden Ticket Attack Explained 

VbScrub
Подписаться 10 тыс.
Просмотров 39 тыс.
50% 1

Taking a look at Kerberos "Golden Ticket" attacks with Mimikatz.
As mentioned in the video, here's my DC Sync explanation: • DC Sync Attacks With S...
My blog: vbscrub.com

Опубликовано:

 

11 мар 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 36   
@isuggestthings9179
@isuggestthings9179 Год назад
I will just say that this is one of the most underrated youtube channels around active directory that I've found. Great, GREAT Work mate, keep it up.
@SuperMarkusparkus
@SuperMarkusparkus 4 года назад
Thank you VbScrub!
@MygenteTV
@MygenteTV Год назад
by watching in your videos I learned more about AD then when I did the oscp
@jordicybersec323
@jordicybersec323 11 месяцев назад
Best explanation ever! Thank you so much!
@DHIRAL2908
@DHIRAL2908 4 года назад
Thanks! I learned many things today!
@rongrundy7943
@rongrundy7943 4 года назад
Wonderful explanation
@mohammadaljaddua2962
@mohammadaljaddua2962 Год назад
Thank you for your videos i really appreciate it, but also if you can for future videos show us how to see and detect them in the logs would be great
@JohnDoe-pm2fm
@JohnDoe-pm2fm Год назад
Perfectly explained...
@brettnieman3453
@brettnieman3453 4 года назад
great video! looking forward to your kerberos video. hopefully it will be a great compliment to Kelly Handerhan's :)
@Guysudai1
@Guysudai1 4 года назад
Amazing consistent content :) Did your box, was very cool learning about al**** st****
@vbscrub
@vbscrub 4 года назад
glad you enjoyed. I've got another box being released in the next couple of weeks. Hope you find that one interesting too
@friktogurg9242
@friktogurg9242 Месяц назад
@@vbscrub Can i call KRBTGT account as keberos TGT account instead and still be correct? If exam question ask the name of the account? It means the same, doesn't it?
@securitytesting2701
@securitytesting2701 Год назад
very good learning..
@272mahesh
@272mahesh 3 года назад
Awesome video, Any idea how can we prevent these attacks?
@Clutchisback1PC
@Clutchisback1PC 4 года назад
I finally understand how to use this attack lol...the tip on /ptt and the tip on using the FQDN helped tremendously on understanding why my attempts in the past failed. i wasnt using kerberos authentication.
@vbscrub
@vbscrub 4 года назад
yeah its not very intuitive, but once you know its not too bad :)
@frybait0626
@frybait0626 Месяц назад
How about meterpreter > kiwi ? How can I force the popup of the commandline after I execute the command kiwi_cmd "misc::cmd" ?
@erandiherath1593
@erandiherath1593 Год назад
Good
@eed5278
@eed5278 4 года назад
Amazing!! Is kerberoasting in the list of future videos?
@vbscrub
@vbscrub 4 года назад
Yeah the next video I'm doing is on kerberoasting and silver tickets :)
@jieliau9674
@jieliau9674 Год назад
May I ask one question that I followed the steps and can see admin session using klist, But when I use net use to mount AD's C drive, the username/password is still prompt. Where can I check?
@CyberCelt.
@CyberCelt. 2 года назад
Could you elaborate on the last bit where you say it can't be used using a remote shell please? I'm in that situation in the OSCP labs and I've struggled to understand when I've loaded a ticket how to use it given misc::cmd doesn't work but I guess it would work with gui access. I think this might be the reason. Not sure when we close Mimikatz is the ticket loaded into the reverse shell prompt too....
@vbscrub
@vbscrub 2 года назад
what I meant was that if you wanted to access files on that same machine you had the reverse shell on, then there's no kerberos authentication going on there becase kerberos only gets used when you access things across the network, so your ticket won't get used in that scenario. Obviously you are technically accessing those files over the network because you're using a reverse shell, but from the shell session's point of view (which is where you have your ticket) they would only be local files. Hope that makes sense. Oh and yeah anything you do in mimikatz is still in the same session as whatever you launched mimikatz from, so any tickets created/imported there still exist there after that. You can use the built in Windows command "klist" to check and see what tickets are cached in your current session wherever you are
@HarsikaMaduwanthi-kj2nn
@HarsikaMaduwanthi-kj2nn Год назад
👍👍👍👍👍
@minhquan4115
@minhquan4115 Год назад
if i set permission for that user then when i impacket_psexec i cant login to that user
@spotifyfan8084
@spotifyfan8084 4 года назад
I understand that the TGT can be forget easily if you own the nltm hash of the krbtgt user, but what about the session key? i watched your video where you explain kerberos, and in the as-rep, the client gets back the tgt and a session key. Then for the tgs-req the session key obtained in as-rep is used to encrypt some data, so the question is here, when you get the as-rep back, as client, the session key will be encrypted with the clients password, and then this encrypted session key will be used to encrypt the data in the tgs-req. So an attacker can forge the tgt since its encrypted with the krbtgt ntlm hash but how can the attacker forge the session key? he obviously doesnt know the administrator's password, so how is that attack possible?
@robmarks6800
@robmarks6800 4 года назад
As he said in the video you must actually have access to the admin account to perform this attack
@freestylebeginner
@freestylebeginner 4 года назад
I have a qn, shldnt we be looking at the AS-REP in wireshark that has the hashed krbtgt reply?
@vbscrub
@vbscrub 4 года назад
I believe the password for the krbtgt account is randomly generated by AD during installation and is very long and complex, so it would take an extremely long time to crack (if you could even crack it at all). Having said that, it is possible for admins to reset the password to anything so I guess you could try it just in case they've reset it to something relatively simple, but in reality most of the time its going to be a waste of time.
@alejandroparrello6493
@alejandroparrello6493 Год назад
@VbScrub hi! Just today I read in ms docs that no matter password you set, automatically windows generates a random one with same complexity... hope i help regards from Argentina 😉👋 hope
@subxi5744
@subxi5744 Год назад
12:00 - in which part of the video you specify the 500 SID?
@vbscrub
@vbscrub Год назад
oh yeah it just defaults to that if you don't specify one. Same with the groups it adds you to (domain admins etc) if you don't specify group SIDs yourself
@falcon01-wafi82
@falcon01-wafi82 3 года назад
How do you get secretsdump.py and download it?
@HarsikaMaduwanthi-kj2nn
@HarsikaMaduwanthi-kj2nn Год назад
Dood
Далее
Kerberos Silver Ticket Attack Explained
20:20
Просмотров 14 тыс.
DC Sync Attacks With Secretsdump.py
20:25
Просмотров 16 тыс.
Сумерки сасага🧛
11:41
Просмотров 1,2 млн
SANS Webcast: Kerberos & Attacks 101
46:38
Просмотров 26 тыс.
Kerberos - authentication protocol
6:08
Просмотров 487 тыс.
Протокол Kerberos
31:05
Просмотров 16 тыс.
Taming Kerberos - Computerphile
16:06
Просмотров 320 тыс.
Attacking Active Directory - Kerberoasting
13:22
Просмотров 37 тыс.