Golden ticket + ExtraSid
Last updated
Last updated
We have done the exploitation on one command with impacket raiseChild.py, now let’s just do the same but step by step and create the golden ticket.
Full explanation on the attack can be found here : https://adsecurity.org/?p=1640
First dump the krbtgt of the domain we own
Now get the child and parent domain SID
Get SID for north.newyork.local
Get SID for NewYork.local
And now create the golden ticket : we add “-519” at the end of the extra-sid (means enterprise admin) (list of domain SID here : https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers)
The task for you is to add the ccname and do a -no-pass like we have done before :)
And we use the ticket to dump the parent domain NTDS