Overview
Request service tickets (TGS) for specific services using an existing Ticket Granting Ticket (TGT). This command enables access to specific services and is essential for lateral movement and service access in Kerberos environments.Syntax
Required Parameters
Base64-encoded TGT or path to .kirbi file
Target service SPN(s) - comma-separated for multiple services
Optional Parameters
Domain controller to target
Save service ticket to file
Pass-the-ticket (inject service ticket)
Use enterprise principal format
Request User-to-User authentication ticket
Request specific encryption type (DES|RC4|AES128|AES256)
Examples
Service Principal Names (SPNs)
Common Service Types
Common Service Types
File and Print Services:
cifs/server.domain.com- SMB/CIFS file sharingnfs/server.domain.com- Network File System
http/webserver.domain.com- HTTP web serviceshttps/webserver.domain.com- HTTPS secure web
host/computer.domain.com- General host servicesrpcss/server.domain.com- RPC endpoint mapper
ldap/dc.domain.com- LDAP directory accessgc/dc.domain.com- Global catalog access
Database Services
Database Services
SQL Server:
MSSQLSvc/server.domain.com:1433- Default instanceMSSQLSvc/server.domain.com:NAMED- Named instance
oracle/server.domain.com- Oracle database
postgres/server.domain.com- PostgreSQLmysql/server.domain.com- MySQL
Advanced Options
Enterprise Principal Format
Enterprise Principal Format
Standard vs Enterprise:Benefits of Enterprise Format:
- Works across domain trusts
- Simplifies cross-domain access
- Handles complex forest scenarios
User-to-User Authentication
User-to-User Authentication
U2U Protocol:Use Cases:
- Bypass service key requirements
- Access services without knowing service account password
- Specialized authentication scenarios
Encryption Type Handling
Encryption Negotiation
Encryption Negotiation
Automatic Selection:
- Client and server negotiate highest supported encryption
- Typically results in AES256 in modern environments
- Falls back to RC4 for legacy compatibility
Lateral Movement Applications
File System Access
File System Access
SMB/CIFS Access:
Administrative Access
Administrative Access
Remote Administration:
Database Access
Database Access
SQL Server Access:
Service Discovery
SPN Enumeration
SPN Enumeration
PowerShell Discovery:LDAP Queries:
Pass-the-Ticket Integration
Automatic Injection
Automatic Injection
Using /ptt flag:Manual Injection:
Error Handling
Common Errors
Common Errors
Service Not Found:
- SPN doesn’t exist or is misspelled
- Service not registered in Active Directory
- TGT doesn’t have required privileges
- Service account restrictions
- Requested encryption type not supported
- Encryption downgrade policies
Operational Security
Detection Considerations
Detection Considerations
Event Logs:
- Event ID 4769 (Service ticket requested)
- Multiple rapid service ticket requests
- Unusual service access patterns
- Service tickets without subsequent service access
- Bulk SPN enumeration
- Cross-domain service requests
Evasion Techniques
Evasion Techniques
Targeted Requests:
- Request only needed service tickets
- Space out requests over time
- Use legitimate service patterns
- Prefer AES encryption when possible
- Match environment encryption standards
- Avoid RC4 in modern environments