Skip to main content

Overview

Continuously harvest TGTs from 4624 logon events by monitoring authentication activities and automatically extracting tickets from new logon sessions. This command provides persistent credential collection capabilities for long-term operations.

Syntax

Rubeus.exe harvest [options]

Optional Parameters

interval
number
Monitoring interval in seconds (default: 30)
outdir
string
Directory to save extracted tickets
filteruser
string
Filter by username pattern (supports wildcards)

Examples

# Start harvesting with default settings
Rubeus.exe harvest

# Custom monitoring interval
Rubeus.exe harvest /interval:60

# Save tickets to directory
Rubeus.exe harvest /outdir:C:\temp\tickets

Harvesting Process

4624 Logon Events:
  • Monitors Windows Security log for new logons
  • Detects interactive, network, and service logons
  • Identifies high-value authentication events
  • Tracks both local and domain authentications
Real-Time Processing:
  • Immediate ticket extraction upon logon detection
  • Automatic LUID identification
  • Background processing capabilities
  • Continuous operation support
Automatic Collection:
  • Extracts TGT from new logon session
  • Stores ticket in specified format
  • Saves to files or displays output
  • Maintains detailed logging
Data Preservation:
  • Preserves original ticket structure
  • Maintains encryption information
  • Stores timing and user details
  • Supports batch processing

Strategic Applications

Persistent Harvesting:
  • Deploy for extended monitoring periods
  • Capture credentials from multiple users
  • Build comprehensive credential database
  • Support long-term access operations
Automated Operations:
  • Reduce manual intervention requirements
  • Enable 24/7 credential collection
  • Support large-scale deployments
  • Facilitate bulk credential analysis
Administrative Accounts:
  • Focus on domain administrator logons
  • Target service account authentications
  • Capture privileged user sessions
  • Identify delegation-enabled accounts
Timing Advantages:
  • Capture credentials during business hours
  • Benefit from normal user activities
  • Leverage authentication patterns
  • Optimize collection windows

Output Management

Directory Organization:
# Example output structure
C:\harvested\
├── 2024-10-25_admin_0x54321.kirbi
├── 2024-10-25_serviceaccount_0x12345.kirbi
└── 2024-10-25_user1_0x67890.kirbi
File Naming:
  • Date and time stamps
  • Username identification
  • LUID for session tracking
  • Consistent naming conventions
Console Output:
# Example harvest output
[*] 10/25/2024 2:15:30 PM - 4624 logon event
[*] Username        : CORP\admin
[*] LogonType       : 3 (Network)
[*] LUID            : 0x54321
[*] Extracting TGT...
[*] TGT saved to    : C:\harvested\2024-10-25_admin_0x54321.kirbi

[*] 10/25/2024 2:18:45 PM - 4624 logon event
[*] Username        : CORP\serviceaccount
[*] LogonType       : 5 (Service)
[*] LUID            : 0x12345
[*] Extracting TGT...
[*] TGT saved to    : C:\harvested\2024-10-25_serviceaccount_0x12345.kirbi

Filtering Capabilities

Pattern Matching:
  • Wildcard support for flexible filtering
  • Regular expression capabilities
  • Domain-specific filtering
  • Role-based targeting
Filter Examples:
# Administrative accounts
Rubeus.exe harvest /filteruser:*admin*

# Service accounts
Rubeus.exe harvest /filteruser:svc_*

# Specific domain
Rubeus.exe harvest /filteruser:CORP\\*

# Multiple patterns (if supported)
Rubeus.exe harvest /filteruser:admin*,svc_*
High-Value Targets:
  • Domain administrators
  • Enterprise administrators
  • Service accounts with delegation
  • Application service accounts
  • Cross-domain trust accounts
Exclusion Strategies:
  • Filter out low-privilege accounts
  • Exclude computer accounts
  • Skip guest and anonymous logons
  • Avoid noisy service accounts

Integration Workflows

Complete Workflow:
# 1. Start harvesting operation
Rubeus.exe harvest /outdir:C:\collected /filteruser:admin*

# 2. Let run for collection period
# Harvest captures tickets automatically

# 3. Analyze collected tickets
for /f %i in ('dir /b C:\collected\*.kirbi') do (
  Rubeus.exe describe /ticket:C:\collected\%i
)

# 4. Use high-value tickets
Rubeus.exe ptt /ticket:C:\collected\admin_ticket.kirbi
Batch Operations:
# 1. Harvest to directory
Rubeus.exe harvest /outdir:C:\tickets

# 2. Process all collected tickets
Rubeus.exe ptt /ticket:C:\tickets\admin*.kirbi

# 3. Test access with collected credentials
dir \\target.corp.local\c$

Operational Considerations

System Resources:
  • Minimal CPU overhead
  • Low memory consumption
  • Efficient event processing
  • Configurable monitoring intervals
Scalability:
  • Supports long-term deployment
  • Handles high-volume environments
  • Manages storage requirements
  • Optimizes for performance
Disk Space:
  • Monitor output directory size
  • Implement rotation policies
  • Compress old tickets
  • Archive collected credentials
Organization:
  • Consistent file naming
  • Date-based directories
  • User-based categorization
  • Automated cleanup scripts

Detection and Evasion

Monitoring Indicators:
  • Event log access patterns
  • Continuous background processes
  • File system activity in output directories
  • LSA authentication package interactions
Behavioral Analysis:
  • Long-running processes
  • Repeated authentication queries
  • Unusual file creation patterns
  • Network authentication anomalies
Operational Security:
  • Use legitimate process names
  • Vary monitoring intervals
  • Implement random delays
  • Correlate with normal activities
Technical Evasion:
  • Deploy from system directories
  • Use process hollowing techniques
  • Implement encryption for stored tickets
  • Employ anti-analysis measures

Troubleshooting

Access Problems:
  • Insufficient privileges for event log access
  • LSA authentication package restrictions
  • Output directory permission issues
  • Anti-malware interference
Collection Failures:
  • Missing logon events
  • Ticket extraction errors
  • Storage space limitations
  • Process termination issues
Performance Tuning:
  • Adjust monitoring intervals
  • Optimize filtering patterns
  • Manage output storage
  • Balance collection vs. detection
Reliability Improvements:
  • Implement error handling
  • Add logging capabilities
  • Create backup mechanisms
  • Monitor process health
  • monitor - Real-time ticket monitoring
  • dump - Extract existing tickets
  • ptt - Use harvested tickets
  • describe - Analyze harvested tickets