Last updated
Last updated
Используем полученный где-то тикет (TGT или TGS, чаще из LSASS) для доступа к ресурсам или сервисам другого пользователя.
The Pass the Ticket technique consists on steal a ticket and the associated session key and use them to impersonate the user in order to access to resources or services. Both TGTs and STs can be used, but TGTs are preferred since they allow to access to any service (by using it to request a ST) on behalf of the user, whereas the STs are limited to only one service (or more if the to another service of the same user).
In Windows, the tickets can be found in the lsass process memory, and can be extracted with command or command. Other possibility is to dump lsass process with tools like , , and extract the tickets offline with mimikatz or . These commands extracts tickets with the krb format.
Dumping lsass memory with procdump:
Retrieving tickets from lsass dump with pypykatz:
Inject TGT into current Windows session:
To machine, you must inject them into the lsass process, which can be done with command or command. These utilities read tickets in the krb format.
Once the tickets are injected into the session, you can use any tool to perform actions by impersonating the user over the network, like .