Overview
Create silver tickets (forged TGS tickets) for specific services using service account credentials. Silver tickets provide direct access to individual services without requiring domain controller interaction, making them useful for stealth operations and service-specific access.Syntax
Required Parameters
Username for the forged ticket
Service Principal Name (SPN) to target
Credential Parameters (Choose One)
RC4/NTLM hash of the service account
AES128 key of the service account
AES256 key of the service account
Optional Parameters
Domain for the ticket (default: current domain)
Domain SID for the ticket
Comma-separated list of group RIDs (default: 513,512,520,518,519)
Ticket start time (default: now)
Ticket end time (default: 10 years)
Ticket renew time (default: 10 years)
Save ticket to file
Pass-the-ticket (inject immediately)
Examples
Service Targeting
Common Service Types
Common Service Types
File Services (CIFS):Remote Administration (HOST):Database Access (MSSQL):
Service Account Requirements
Service Account Requirements
Hash Acquisition:
- Service account NTLM hash (RC4)
- Service account AES keys (AES128/256)
- Computer account credentials for machine services
- Manual hash extraction from compromised systems
- User service accounts (custom applications)
- Machine accounts (computer services)
- Managed service accounts (MSAs)
- Group managed service accounts (gMSAs)
Silver Ticket Advantages
Operational Benefits
Operational Benefits
Stealth Characteristics:
- No domain controller communication required
- Direct service authentication
- Bypasses many detection mechanisms
- Reduced network traffic and logs
- Long validity periods (up to 10 years)
- Survives password changes (until service key rotation)
- Independent of domain controller availability
- Resilient to many defensive measures
Technical Advantages
Technical Advantages
Service-Specific Access:
- Targeted service authentication
- Precise permission control
- Minimal privilege exposure
- Focused attack scope
- Custom user identity
- Configurable group memberships
- Adjustable validity periods
- Multiple encryption types
Credential Acquisition
Service Account Hashes
Service Account Hashes
Common Sources:
- Kerberoasting attacks (service accounts)
- Memory dumps from compromised systems
- DCSync attacks for computer accounts
- Cached credential extraction
Machine Account Credentials
Machine Account Credentials
Computer Account Access:
- Local computer account hash extraction
- Registry-based credential recovery
- Memory-based hash extraction
- Network capture and analysis
Integration Workflows
Post-Kerberoasting
Post-Kerberoasting
Complete Attack Chain:
Lateral Movement
Lateral Movement
Service-Hopping Strategy:
Group Configuration
Default Groups
Default Groups
Standard Group RIDs:
- 513: Domain Users
- 512: Domain Admins
- 520: Group Policy Creator Owners
- 518: Schema Admins
- 519: Enterprise Admins
- Domain Admins (512) provides broad administrative access
- Enterprise Admins (519) for forest-wide operations
- Custom groups for specific service permissions
Custom Group Targeting
Custom Group Targeting
Service-Specific Groups:Group Discovery:
- LDAP enumeration for service-specific groups
- Analysis of service permissions and ACLs
- Review of application-specific role memberships
- Custom group identification through reconnaissance
Defensive Considerations
Detection Challenges
Detection Challenges
Limited Visibility:
- No KDC interaction for validation
- Standard service authentication patterns
- Difficult to distinguish from legitimate tickets
- Minimal unusual network activity
- Unusual service access patterns
- Access from unexpected accounts
- Service tickets with suspicious characteristics
- Correlation with other attack indicators
Mitigation Strategies
Mitigation Strategies
Technical Controls:
- Regular service account key rotation
- Enhanced service authentication logging
- Privileged account monitoring
- Service permission auditing
- Regular security assessments
- Service account management procedures
- Monitoring for unusual service access
- Incident response planning
Related Commands
kerberoast- Extract service account hashesgolden- Domain-wide ticket forgeryptt- Inject forged ticketsdescribe- Analyze forged tickets