Overview
Extract the current user’s TGT by abusing Kerberos delegation mechanisms. This technique leverages the GSS-API to obtain a usable TGT without requiring elevated privileges, making it valuable for credential extraction in constrained environments.Syntax
Optional Parameters
Target SPN for delegation request (default: cifs/dc.domain.local)
Save extracted TGT to file
Pass-the-ticket (inject extracted TGT)
Don’t wrap base64 output
Examples
Technical Background
Delegation Mechanism
Delegation Mechanism
GSS-API Abuse:
- Leverages InitializeSecurityContext() API
- Abuses Kerberos delegation features
- Forces KDC to include user’s TGT
- Extracts TGT from AP-REQ structure
- Uses standard user privileges
- Bypasses traditional extraction restrictions
- Works from any authentication context
- Avoids memory dumping requirements
Attack Vector
Attack Vector
Credential Access:
- Extracts current user’s TGT
- Provides reusable authentication token
- Enables credential theft without hashes
- Supports lateral movement operations
- Uses legitimate Windows APIs
- Minimal suspicious activity
- No process injection required
- Limited detection footprint
Use Cases
Credential Extraction
Credential Extraction
Non-Privileged Environments:
- Extract TGT without admin rights
- Bypass UAC and privilege restrictions
- Obtain credentials from limited contexts
- Support initial access scenarios
- Extract from any authenticated session
- Support remote execution scenarios
- Enable credential harvesting at scale
- Facilitate cross-system operations
Persistence and Movement
Persistence and Movement
Credential Reuse:
- Use extracted TGT on other systems
- Support offline attack scenarios
- Enable persistent access mechanisms
- Facilitate credential relay attacks
- Move TGT to other systems
- Support multi-host operations
- Enable privilege escalation paths
- Expand attack surface systematically
Target Selection
Default Target
Default Target
CIFS Service:
- Default: cifs/dc.domain.local
- Common service type
- Generally accessible
- Minimal suspicious activity
- Ensures delegation compatibility
- Maximizes success probability
- Leverages standard service patterns
- Maintains operational security
Custom Targets
Custom Targets
Service Selection:
- Any accessible SPN
- Must support delegation
- Should avoid detection triggers
- Consider service availability
- File servers (CIFS)
- Web services (HTTP)
- Administrative services (HOST)
- Database services (MSSQL)
Integration Workflows
Initial Access
Initial Access
Post-Compromise Extraction:
Credential Harvesting
Credential Harvesting
Multi-User Extraction:
Advantages and Limitations
Advantages
Advantages
Operational Benefits:
- No elevation required
- Works from any user context
- Minimal detection footprint
- Standard API usage patterns
- Bypasses memory protection
- Avoids process injection
- Uses legitimate delegation features
- Reliable extraction method
Limitations
Limitations
Scope Restrictions:
- Only extracts current user’s TGT
- Cannot access other sessions
- Limited to authenticated context
- Requires delegation support
- Requires domain connectivity
- Needs accessible target SPN
- Depends on delegation configuration
- May trigger some monitoring
Operational Security
Detection Considerations
Detection Considerations
Low-Risk Indicators:
- Standard Kerberos traffic
- Legitimate API usage
- Normal delegation patterns
- Minimal unusual behavior
- Unusual target SPN selection
- High-frequency extraction attempts
- Non-standard timing patterns
- Correlation with other activities
Evasion Techniques
Evasion Techniques
Blending Strategies:
- Use during business hours
- Select realistic target SPNs
- Vary extraction timing
- Correlate with normal activities
- Choose common service types
- Avoid suspicious SPNs
- Use legitimate service patterns
- Match organizational standards