home.social

#goldenticket — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #goldenticket, aggregated by home.social.

  1. Microsoft graciously offers a golden ticket to... 7% of its employees who must have been dreaming of an escape from their corporate utopia. 🎟️💼 Meanwhile, #TechCrunch is frantically hawking tickets to their next "can't-miss" event like it's the last chopper out of Saigon. 🚁🎫
    techcrunch.com/2026/04/23/micr #Microsoft #CorporateEscape #GoldenTicket #EventNews #HackerNews #ngated

  2. The worst case has happened: Hackers have managed to breach your network and elevate their privileges to their ultimate goal: Domain Admin.

    Today, we will take a look at one of the attacks that this absolute nightmare scenario makes possible for attackers: Golden Tickets (MITRE T1558.001)

    But let’s start at the beginning: Kerberos authentication. When a user logs in, a Ticket Granting Ticket (TGT) is issued to the user. Put very simply, the ticket contains, among other things, the username to identify the user. To prevent users from simply modifying a ticket and impersonating other users, the ticket is encrypted.

    The encryption key that secures the ticket is essentially the password hash of a user called krbtgt. This makes the krbtgt user one of the most sensitive, if not the most sensitive, user in an Active Directory domain. If this user's password is weak or the password (hash) is compromised, the entire domain is compromised.

    This is because attackers can use this password hash to forge their own tickets and impersonate any user they want. They simply create a ticket with the username they want and encrypt it with the password hash. They now have an authentication ticket that, if done correctly, is virtually indistinguishable from a real ticket.

    And that's what’s called a “Golden Ticket”. And there are many tools available to attackers, the most prominent of which are: Mimikatz, Rubeus and Impacket.

    The fact that it abuses legitimate functionality, makes it difficult to detect a Golden Ticket attack. However, there are a few things that you can look out for:

    * Are there TGS requests (Event 4769) without the original TGT being issued by the KDC (Event 4768)?
    * Is RC4 encryption being used?
    * Strange TGT parameters (e.g. very long lifetimes)?
    * Are there logins from sensitive accounts that aren’t normally used (e.g. the default domain administrator account)?

    Additionally, you can also look for signs of Pass the Ticket attacks (MITRE T1550.003).

    To mitigate this attack, the krbtgt password should be changed whenever a highly privileged user leaves the organization and additionally on a fixed schedule (and, of course, if you suspect a compromise). Make sure that the password is very, very strong.

    But changing the password once is not enough. It has to be changed twice because of the password history. However, be careful not to do this in quick succession. The change must be replicated to other domain controllers first. Otherwise, you risk severe authentication problems.

    #itsecurity #GoldenTicket #ttp #mitre #redteam #redteaming #TechTuesday

  3. Раскуриваем Golden Ticket и смотрим артефакты

    🔥 Атака Golden Ticket позволяет злоумышленнику выпустить золотой билет Kerberos (TGT) с помощью секретного ключа (хэш) сервисной учетной записи KRBTGT. Данная техника позволяет максимально скрыть следы своего присутствия, поскольку для инфраструктуры злоумышленник будет казаться легитимным пользователем, но без фактической аутентификации и с желаемыми правами. В данной статье разберем атаку на практике и научимся ее детектить по артефактам...

    habr.com/ru/articles/836818/

    #golden_ticket #goldenticket #ad #activedirectory #rubeus #impacket