Overview
Create diamond tickets, a sophisticated ticket forgery technique that combines legitimate TGT components with forged elements. This approach leverages legitimate authentication while modifying specific ticket attributes, making detection significantly more challenging than traditional golden tickets.Syntax
Authentication Parameters
Username for authentication
Password for authentication
RC4/NTLM hash for authentication
AES128 key for authentication
AES256 key for authentication
Kerberos Key Parameters
Kerberos key for ticket decryption/modification (AES256 preferred)
Encryption type for Kerberos key (default: aes256)
Modification Options
Comma-separated list of group RIDs to inject
Additional SIDs to include in ticket
Custom ticket end time
Custom ticket renew time
Output Options
Save forged ticket to file
Pass-the-ticket (inject immediately)
Examples
Technical Overview
Diamond Ticket Concept
Diamond Ticket Concept
Hybrid Approach:
- Starts with legitimate TGT from real authentication
- Decrypts legitimate ticket components
- Modifies specific attributes (groups, privileges)
- Re-encrypts with legitimate structure
- Uses legitimate authentication patterns
- Maintains realistic ticket characteristics
- Harder to detect than purely forged tickets
- Leverages actual user credentials
Attack Flow
Attack Flow
Process Steps:
- Legitimate Authentication: Request TGT with valid credentials
- Ticket Decryption: Decrypt TGT using KDC key material
- Attribute Modification: Add privileged groups or SIDs
- Re-encryption: Encrypt modified ticket with KDC key
- Ticket Injection: Use modified ticket for authentication
- Valid user credentials (password or hash)
- KDC key material (KRBTGT key)
- Understanding of ticket structure
- Proper encryption handling
Credential Requirements
User Authentication
User Authentication
Legitimate Credentials:
- Valid domain user password
- User NTLM hash from previous compromise
- User AES keys from Kerberos operations
- Any authentication method accepted by KDC
- Low-privilege user accounts (less suspicious)
- Service accounts with legitimate access
- Test accounts with known credentials
- Accounts with minimal monitoring
KDC Key Material
KDC Key Material
KRBTGT Key Sources:
- DCSync attacks against domain controllers
- Memory dumps from compromised DCs
- Cached KRBTGT keys from previous operations
- Golden ticket creation prerequisites
Privilege Escalation
Group Injection
Group Injection
Administrative Groups:Group RID Reference:
- 512: Domain Admins
- 519: Enterprise Admins
- 520: Group Policy Creator Owners
- 518: Schema Admins
- Custom organizational groups
SID Injection
SID Injection
Additional Privileges:SID Sources:
- High-privilege custom groups
- Service-specific permissions
- Cross-domain trust relationships
- Application-specific roles
Operational Advantages
Detection Evasion
Detection Evasion
Legitimate Characteristics:
- Real authentication event logs
- Valid ticket structure and timing
- Proper encryption and signatures
- Normal user authentication patterns
- No purely forged ticket artifacts
- Matches expected user behavior
- Uses legitimate authentication flows
- Maintains realistic ticket attributes
Persistence Benefits
Persistence Benefits
Long-term Access:
- Survives normal password changes (until KRBTGT rotation)
- Maintains elevated privileges
- Provides stealth administrative access
- Supports long-term operations
- Use any legitimate user account
- Modify privilege levels as needed
- Create multiple variants for different purposes
- Adapt to changing operational requirements
Integration Workflows
Post-Compromise Escalation
Post-Compromise Escalation
Complete Attack Chain:
Stealth Administrative Access
Stealth Administrative Access
Low-Profile Operations:
Defensive Considerations
Detection Challenges
Detection Challenges
Limited Indicators:
- Legitimate authentication events
- Valid ticket structure and encryption
- Normal user behavior patterns
- Difficult to distinguish from legitimate access
- Unusual privilege escalation patterns
- Administrative access from low-privilege accounts
- Ticket analysis for modified attributes
- Behavioral analysis of user activities
Mitigation Strategies
Mitigation Strategies
Technical Controls:
- Regular KRBTGT key rotation
- Enhanced authentication monitoring
- Privileged access management (PAM)
- Ticket inspection and validation
- Regular credential rotation
- Monitoring for unusual administrative access
- User behavior analytics
- Incident response procedures
Troubleshooting
Common Issues
Common Issues
Authentication Failures:
- Invalid user credentials
- Account lockout or disabled status
- Network connectivity problems
- Domain controller accessibility
- Incorrect KRBTGT key material
- Encryption type mismatches
- Invalid group or SID specifications
- Timing or format issues
Optimization
Optimization
Performance Improvements:
- Use AES256 encryption for better security
- Optimize group selections for specific targets
- Cache KRBTGT keys for repeated use
- Streamline authentication processes
- Verify user account status before operation
- Test KRBTGT key validity
- Use realistic timing and attribute values
- Monitor for defensive responses