Overview
List Kerberos tickets in the current logon session or a specified LUID. This command provides detailed information about cached tickets including service names, encryption types, and validity periods.Syntax
Optional Parameters
Target specific logon session ID (requires elevation)
Filter tickets by specific username
Filter tickets by service name pattern
Examples
Ticket Information
Displayed Details
Displayed Details
Basic Information:
- Client name and realm
- Server name and realm
- Encryption type (RC4, AES128, AES256)
- Key version number (kvno)
- Start time (valid from)
- End time (expires)
- Renew time (renewable until)
- Current validity status
- Ticket cache location
- Ticket flags and attributes
- Session key information
- Authorization data presence
Use Cases
Session Verification
Session Verification
Authentication Status:
- Verify successful authentication
- Check current access permissions
- Validate ticket injection success
- Monitor session state changes
- Debug authentication failures
- Identify expired tickets
- Verify service access capabilities
- Check encryption compatibility
Operational Awareness
Operational Awareness
Security Assessment:
- Inventory available access
- Identify privilege boundaries
- Map service relationships
- Track authentication history
- Plan ticket extraction targets
- Verify cleanup effectiveness
- Monitor persistent access
- Assess operational security
Session Targeting
Current Session (Default)
Current Session (Default)
Standard Operation:
- Lists tickets from current user session
- No special privileges required
- Safe reconnaissance operation
- Limited to user context
- TGT for current domain
- Service tickets for accessed resources
- Cross-realm tickets if applicable
- Delegation tickets if authorized
Specific LUID Targeting
Specific LUID Targeting
Elevated Requirements:
- Requires administrative privileges
- Can target any logon session
- System-wide ticket visibility
- Enhanced reconnaissance capabilities
Output Analysis
Understanding Results
Understanding Results
Sample Output:Key Elements:
- Ticket number for extraction reference
- Service access scope
- Encryption strength assessment
- Validity window analysis
- Flag configuration review
Integration Workflows
Pre-Extraction Planning
Pre-Extraction Planning
Target Identification:
Post-Injection Verification
Post-Injection Verification
Success Validation:
Ticket Types
Ticket Granting Tickets (TGTs)
Ticket Granting Tickets (TGTs)
Identification:
- Server: krbtgt/DOMAIN.LOCAL
- Provides broad authentication capabilities
- Renewable for extended validity
- Foundation for service ticket requests
- Enables lateral movement
- Supports privilege escalation
- Allows service enumeration
- Facilitates persistence
Service Tickets
Service Tickets
Common Services:
- CIFS (file sharing)
- HOST (administrative access)
- LDAP (directory services)
- HTTP (web applications)
- MSSQL (database access)
- Direct service authentication
- Specific resource access
- Limited scope operations
- Immediate usability
Operational Security
Detection Considerations
Detection Considerations
Low-Risk Operations:
- Standard Windows API usage
- Normal authentication queries
- Minimal log generation
- Difficult to distinguish from legitimate activity
- Use during business hours
- Limit frequency of queries
- Avoid automated scripting patterns
- Correlate with normal user behavior