PRIMARY CATEGORY → KERBEROS

Theory

Reference

This technique only makes use of the RC4_HMAC or NTLM Hash

It converts a NTLM Hash derived from a principal’s password into a valid Ticket Granting Ticket (TGT)


OverPassing The Hash

Mimikatz

Mimikatz

Privileges needed as the sekurlsa module is used (LSASS.exe Memory Manipulation)

It creates a New Logon Type 9 (NewCredentials) with dummy credentials (Another LUID) to not interfere with the current Logon Session

An Active Logon Session can only have ONE Ticket Granting Ticket (TGT)

Then, opens the LSASS.exe to write to its memory and injects the provided RC4_HMAC Hash into the appropiate section of the created Logon Session

mimikatz.exe 'privilege::debug' 'token::elevate' 'sekurlsa::pth /user:<USERNAME> /domain:<DOMAIN> /rc4:<NTLM_HASH> /run:<COMMAND>' exit # By default → cmd.exe

This causes the normal Kerberos authentication process to kick off as normal as if the user had normally logged on, turning the supplied hash into a fully-fledged TGT

The sekurlsa::pth method performs both OverPass the Hash/Pass the Key and Pass the Ticket Techniques

Rubeus

Rubeus

Reference

It builds a Raw AS_REQ for the specified Kerberos Principal and Encryption Key (RC4_HMAC)

If the Kerberos Authentication is sucessfull, the resulting AS_REP is parsed and the TGT is extracted as a Base64 Blob

rubeus.exe asktgt /user:<USERNAME> /rc4:<NTLM_HASH> /nowrap