Overview
Continuously harvest TGTs from 4624 logon events by monitoring authentication activities and automatically extracting tickets from new logon sessions. This command provides persistent credential collection capabilities for long-term operations.Syntax
Optional Parameters
Monitoring interval in seconds (default: 30)
Directory to save extracted tickets
Filter by username pattern (supports wildcards)
Examples
Harvesting Process
Event Monitoring
Event Monitoring
4624 Logon Events:
- Monitors Windows Security log for new logons
- Detects interactive, network, and service logons
- Identifies high-value authentication events
- Tracks both local and domain authentications
- Immediate ticket extraction upon logon detection
- Automatic LUID identification
- Background processing capabilities
- Continuous operation support
Ticket Extraction
Ticket Extraction
Automatic Collection:
- Extracts TGT from new logon session
- Stores ticket in specified format
- Saves to files or displays output
- Maintains detailed logging
- Preserves original ticket structure
- Maintains encryption information
- Stores timing and user details
- Supports batch processing
Strategic Applications
Long-Term Collection
Long-Term Collection
Persistent Harvesting:
- Deploy for extended monitoring periods
- Capture credentials from multiple users
- Build comprehensive credential database
- Support long-term access operations
- Reduce manual intervention requirements
- Enable 24/7 credential collection
- Support large-scale deployments
- Facilitate bulk credential analysis
High-Value Targeting
High-Value Targeting
Administrative Accounts:
- Focus on domain administrator logons
- Target service account authentications
- Capture privileged user sessions
- Identify delegation-enabled accounts
- Capture credentials during business hours
- Benefit from normal user activities
- Leverage authentication patterns
- Optimize collection windows
Output Management
File Storage
File Storage
Directory Organization:File Naming:
- Date and time stamps
- Username identification
- LUID for session tracking
- Consistent naming conventions
Real-Time Display
Real-Time Display
Console Output:
Filtering Capabilities
Username Filtering
Username Filtering
Pattern Matching:
- Wildcard support for flexible filtering
- Regular expression capabilities
- Domain-specific filtering
- Role-based targeting
Strategic Filtering
Strategic Filtering
High-Value Targets:
- Domain administrators
- Enterprise administrators
- Service accounts with delegation
- Application service accounts
- Cross-domain trust accounts
- Filter out low-privilege accounts
- Exclude computer accounts
- Skip guest and anonymous logons
- Avoid noisy service accounts
Integration Workflows
Collection and Analysis
Collection and Analysis
Complete Workflow:
Automated Processing
Automated Processing
Batch Operations:
Operational Considerations
Performance Impact
Performance Impact
System Resources:
- Minimal CPU overhead
- Low memory consumption
- Efficient event processing
- Configurable monitoring intervals
- Supports long-term deployment
- Handles high-volume environments
- Manages storage requirements
- Optimizes for performance
Storage Management
Storage Management
Disk Space:
- Monitor output directory size
- Implement rotation policies
- Compress old tickets
- Archive collected credentials
- Consistent file naming
- Date-based directories
- User-based categorization
- Automated cleanup scripts
Detection and Evasion
Detection Vectors
Detection Vectors
Monitoring Indicators:
- Event log access patterns
- Continuous background processes
- File system activity in output directories
- LSA authentication package interactions
- Long-running processes
- Repeated authentication queries
- Unusual file creation patterns
- Network authentication anomalies
Evasion Techniques
Evasion Techniques
Operational Security:
- Use legitimate process names
- Vary monitoring intervals
- Implement random delays
- Correlate with normal activities
- Deploy from system directories
- Use process hollowing techniques
- Implement encryption for stored tickets
- Employ anti-analysis measures
Troubleshooting
Common Issues
Common Issues
Access Problems:
- Insufficient privileges for event log access
- LSA authentication package restrictions
- Output directory permission issues
- Anti-malware interference
- Missing logon events
- Ticket extraction errors
- Storage space limitations
- Process termination issues
Optimization
Optimization
Performance Tuning:
- Adjust monitoring intervals
- Optimize filtering patterns
- Manage output storage
- Balance collection vs. detection
- Implement error handling
- Add logging capabilities
- Create backup mechanisms
- Monitor process health