Skip to main content

Overview

List Kerberos tickets in the current logon session or a specified LUID. This command provides detailed information about cached tickets including service names, encryption types, and validity periods.

Syntax

Rubeus.exe klist [options]

Optional Parameters

luid
string
Target specific logon session ID (requires elevation)
user
string
Filter tickets by specific username
service
string
Filter tickets by service name pattern

Examples

# List current session tickets
Rubeus.exe klist

# List tickets from specific LUID
Rubeus.exe klist /luid:0x12345

# Filter by service type
Rubeus.exe klist /service:cifs

Ticket Information

Basic Information:
  • Client name and realm
  • Server name and realm
  • Encryption type (RC4, AES128, AES256)
  • Key version number (kvno)
Timing Information:
  • Start time (valid from)
  • End time (expires)
  • Renew time (renewable until)
  • Current validity status
Technical Details:
  • Ticket cache location
  • Ticket flags and attributes
  • Session key information
  • Authorization data presence

Use Cases

Authentication Status:
  • Verify successful authentication
  • Check current access permissions
  • Validate ticket injection success
  • Monitor session state changes
Troubleshooting:
  • Debug authentication failures
  • Identify expired tickets
  • Verify service access capabilities
  • Check encryption compatibility
Security Assessment:
  • Inventory available access
  • Identify privilege boundaries
  • Map service relationships
  • Track authentication history
Planning and Cleanup:
  • Plan ticket extraction targets
  • Verify cleanup effectiveness
  • Monitor persistent access
  • Assess operational security

Session Targeting

Standard Operation:
  • Lists tickets from current user session
  • No special privileges required
  • Safe reconnaissance operation
  • Limited to user context
Information Available:
  • TGT for current domain
  • Service tickets for accessed resources
  • Cross-realm tickets if applicable
  • Delegation tickets if authorized
Elevated Requirements:
  • Requires administrative privileges
  • Can target any logon session
  • System-wide ticket visibility
  • Enhanced reconnaissance capabilities
LUID Discovery:
# Find target logon sessions
Rubeus.exe logonsession

# List specific session tickets
Rubeus.exe klist /luid:0x3e7

Output Analysis

Sample Output:
Rubeus.exe klist

[*] Action: List Kerberos Tickets (Current User)

[*] Current LUID    : 0x12345

Cached Tickets: (4)

#0>     Client: admin @ CORP.LOCAL
        Server: krbtgt/CORP.LOCAL @ CORP.LOCAL
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x60a10000 -> name_canonicalize ; ok_as_delegate ; pre_authent ; renewable ; forwardable
        Start Time: 10/25/2024 1:23:45 PM (local)
        End Time:   10/25/2024 11:23:45 PM (local)
        Renew Time: 11/1/2024 1:23:45 PM (local)

#1>     Client: admin @ CORP.LOCAL
        Server: CIFS/fileserver.corp.local @ CORP.LOCAL
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> name_canonicalize ; ok_as_delegate ; pre_authent ; renewable ; forwardable
        Start Time: 10/25/2024 1:25:12 PM (local)
        End Time:   10/25/2024 11:25:12 PM (local)
        Renew Time: 11/1/2024 1:25:12 PM (local)
Key Elements:
  • Ticket number for extraction reference
  • Service access scope
  • Encryption strength assessment
  • Validity window analysis
  • Flag configuration review

Integration Workflows

Target Identification:
# 1. List available tickets
Rubeus.exe klist

# 2. Identify valuable targets
# Look for TGTs, admin services, delegation tickets

# 3. Extract specific tickets
Rubeus.exe dump /service:krbtgt

# 4. Use extracted tickets elsewhere
Rubeus.exe ptt /ticket:extracted.kirbi
Success Validation:
# 1. Inject ticket
Rubeus.exe ptt /ticket:admin.kirbi

# 2. Verify injection success
Rubeus.exe klist

# 3. Test service access
dir \\fileserver.corp.local\share

Ticket Types

Identification:
  • Server: krbtgt/DOMAIN.LOCAL
  • Provides broad authentication capabilities
  • Renewable for extended validity
  • Foundation for service ticket requests
Strategic Value:
  • Enables lateral movement
  • Supports privilege escalation
  • Allows service enumeration
  • Facilitates persistence
Common Services:
  • CIFS (file sharing)
  • HOST (administrative access)
  • LDAP (directory services)
  • HTTP (web applications)
  • MSSQL (database access)
Access Implications:
  • Direct service authentication
  • Specific resource access
  • Limited scope operations
  • Immediate usability

Operational Security

Low-Risk Operations:
  • Standard Windows API usage
  • Normal authentication queries
  • Minimal log generation
  • Difficult to distinguish from legitimate activity
Best Practices:
  • Use during business hours
  • Limit frequency of queries
  • Avoid automated scripting patterns
  • Correlate with normal user behavior
  • dump - Extract listed tickets
  • triage - Cross-session ticket overview
  • ptt - Inject tickets into session
  • purge - Clear ticket cache