Golden Ticket Attack
Golden Ticket Attack
Navneet Singh
info@cloudmarix.ca
Abstract— Kerberos is network authentication protocol the ticket requests. KDC read the krbtgt hash to verify the
developed by MIT in the 1988 as a part of project Athena. user login, This means, A valid TGT ticket can be created if
Kerberos has been widely adopted by major operating system attacker obtained the the krbtgt hash. KDC trust the TGT
provider Microsoft Windows, Linux,Mac OS as single sign-on
containing following fields
authentication system in client-server architecture for clients
to access multiple open and distributed networks. Golden
ticket attack introduced by Benjamin Delpy in Blackhat 2014 ● Username
Conference held at Las Vegas, Usa has exploited the ● User Domain
vulnerability exist in Kerberos to gain the administrative ● Ticket Encryption Type
access on domain controller by creating and authenticating ● Logon Hours
with forged TGT tickets on the Domain Controller. With ● Group Membership (PAC - SIDs)
Golden Ticket attacker can lurk in the organization forever
even if all users password has been changed. This enabled attacker to create TGT with own specified time as
long as 10 years and assign any group membership.
This paper begin by describing the golden ticket attack
mechanism and section 2 discuss the detection of the forged 2: SIDs
tickets on windows event viewer and monitoring abnormal
activities on Active Directory and Domain Controller. The SID is Security identifier number given to each user in Access
third section suggest the recovery procedure after a successful Control Entry list by the domain controller. SIDs specify the
security breach made with Golden Ticket. Section 4 groups membership of authenticated user. Mimikatz can retrieve
recommended the mitigation strategies that helps to decrease the SIDs of the given username. This mean, Attacker can create
the risk level. TGT and assign administrator privileges by specifying the SIDs.
MITIGATION
Additional Recommendations