Overview
Monitor for new Kerberos TGTs (4624 logon events) and automatically extract them as they appear. This command provides real-time credential harvesting capabilities by watching for authentication events and capturing tickets from new logon sessions.Syntax
Optional Parameters
Monitoring interval in seconds (default: 60)
Filter by specific username pattern
Target specific username only
Don’t wrap base64 output
Monitor registry for new tickets
Examples
Monitoring Mechanisms
Logon Event Monitoring
Logon Event Monitoring
Event-Based Detection:
- Monitors for 4624 logon events
- Detects new authentication sessions
- Tracks interactive and network logons
- Identifies service account authentications
- Automatic ticket extraction upon detection
- Immediate analysis and storage
- Continuous background operation
- Minimal resource consumption
Registry Monitoring
Registry Monitoring
Ticket Storage Detection:
- Monitors LSA ticket cache locations
- Detects new ticket entries
- Tracks ticket cache modifications
- Alternative detection method
- Catches missed logon events
- Provides redundant detection
- Covers edge cases
- Improves reliability
Use Cases
Passive Credential Harvesting
Passive Credential Harvesting
Long-Term Collection:
- Deploy for extended monitoring periods
- Capture credentials from various users
- Build comprehensive credential database
- Support long-term access operations
- Passive monitoring approach
- Minimal system interaction
- Reduced detection probability
- Background collection capabilities
Real-Time Response
Real-Time Response
Immediate Exploitation:
- Capture admin logons as they occur
- Enable rapid privilege escalation
- Support time-sensitive operations
- Maximize attack windows
- Trigger additional attacks automatically
- Chain with other tools and scripts
- Enable reactive attack strategies
- Support automation frameworks
Filtering and Targeting
User Filtering
User Filtering
Pattern Matching:
- Use wildcard patterns for usernames
- Filter administrative accounts
- Target service account patterns
- Exclude low-value accounts
Strategic Targeting
Strategic Targeting
High-Value Accounts:
- Domain administrators
- Service accounts with delegation
- Application service accounts
- Cross-domain trust accounts
- Focus on privilege escalation paths
- Target lateral movement opportunities
- Identify persistence mechanisms
- Support specific attack objectives
Output and Storage
Ticket Extraction
Ticket Extraction
Automatic Processing:
- Extract TGT immediately upon detection
- Display ticket information
- Store in base64 format
- Provide ready-to-use format
Integration Support
Integration Support
External Tool Integration:
- Pipe output to other tools
- Save to files for later use
- Format for automated processing
- Support scripted workflows
Operational Considerations
Performance Impact
Performance Impact
Resource Usage:
- Minimal CPU overhead
- Low memory footprint
- Efficient event processing
- Configurable monitoring intervals
- Non-intrusive monitoring
- No process injection
- Standard API usage
- Minimal detection footprint
Persistence
Persistence
Long-Term Deployment:
- Run as background service
- Integrate with startup scripts
- Deploy via scheduled tasks
- Support persistent access
- Log rotation considerations
- Storage management
- Performance monitoring
- Error handling and recovery
Detection and Evasion
Detection Vectors
Detection Vectors
Potential Indicators:
- Process monitoring event logs
- Unusual registry access patterns
- Continuous background processes
- Network authentication anomalies
- Long-running background processes
- Repeated LSA interactions
- Event log access patterns
- File system monitoring activities
Evasion Strategies
Evasion Strategies
Operational Security:
- Vary monitoring intervals
- Use realistic process names
- Limit monitoring duration
- Correlate with normal activities
- Deploy from legitimate directories
- Use process hollowing or injection
- Implement anti-analysis techniques
- Employ encryption for output
Integration Workflows
Automated Collection
Automated Collection
Complete Harvesting Workflow:
Selective Targeting
Selective Targeting
Focused Collection: