This goal of this post is to be a practical guide to passing Kerberos tickets from a Linux host. In general, penetration testers are very familiar with using Mimikatz to obtain cleartext passwords or NT hashes and utilize them for lateral movement. At times we may find ourselves in a situation where we have local admin access to a host, but are unable to obtain either a cleartext password or NT hash of a target user. Fear not, in many cases we can simply pass a Kerberos ticket in place of passing a hash.
This post is meant to be a practical guide. For a deeper understanding of the technical details and theory see the resources at the end of the post.
To get started we will first need to setup some tools. All have information on how to setup on their GitHub page.
RPM based: yum install krb5-workstation Debian based: apt install krb5-user
autoProc.py (not required, but useful)
This guide will use a simple Windows lab with two hosts:
dc01.winlab.com (domain controller) client01.winlab.com (generic server
And two domain accounts:
Administrator (domain admin) User1 (local admin to client01)
Passing the Ticket
By some prior means we have compromised the account user1, which has local admin access to client01.winlab.com.
A standard technique from this position would be to dump passwords and NT hashes with Mimikatz. Instead, we will use a slightly different technique of dumping the memory of the
lsass.exe process with
procdump64.exe from Sysinternals. This has the advantage of avoiding antivirus without needing a modified version of Mimikatz.
This can be done by uploading
procdump64.exe to the target host:
And then run:
procdump64.exe -accepteula -ma lsass.exe output-file
Alternatively we can use
autoProc.py which automates all of this as well as cleans up the evidence (if using this method make sure you have placed
/opt/procdump/. I also prefer to comment out line 107):
python3 autoProc.py domain/user@target
We now have the
lsass.dmp on our attacking host. Next we dump the Kerberos tickets:
pypykatz lsa -k /kerberos/output/dir minidump lsass.dmp
And view the available tickets:
Ideally, we want a krbtgt ticket. A krbtgt ticket allows us to access any service that the account has privileges to. Otherwise we are limited to the specific service of the TGS ticket. In this case we have a krbtgt ticket for the Administrator account!
The next step is to convert the ticket from
.ccache so that we can use it on our Linux host:
kirbi2ccache input.kirbi output.ccache
Now that the ticket file is in the correct format, we specify the location of the
.ccache file by setting the
KRB5CCNAME environment variable and use
klist to verify everything looks correct:
export KRB5CCNAME=/path/to/.ccache klist
We must specify the target host by the fully qualified domain name. We can either add the host to our
/etc/hosts file or point to the DNS server of the Windows environment.
Finally, we are ready to use the ticket to gain access to the domain controller:
wmiexec.py -no-pass -k -dc-ip w.x.y.z domain/user@fqdn
Excellent! We were able to elevate to domain admin by using pass the ticket! Be aware that Kerberos tickets have a set lifetime. Make full use of the ticket before it expires!
Passing the ticket can be a very effective technique when you do not have access to an NT hash or password. Blue teams are increasingly aware of passing the hash. In response they are placing high value accounts in the Protected Users group or taking other defensive measures. As such, passing the ticket is becoming more and more relevant.
Thanks to the following for providing tools or knowledge: