Pass the Ticket (PtT) from Linux

June 11, 2024

ssh david@inlanefreight.htb@10.129.234.123 -p 2222

Use this to get to root

As we can see the julio user is domain user and can attempt to get access to the domain shared folder via julio

Now we can impersonate the user via export command

As you can see we have julio as default principal

You have to be fast to authenticate to smbclient since the ticket is just temporary

You gotta find the file containing the credentials of Linux machines in Active Directory.

Or we could just use the keytab since we have permission so that we can impersonate the user linux01


Now for the next not required task

First we have to ssh to the machine

Get the linikatz.sh

This tool will find for kerberos tickets in the system


I made a visual graph about the network

Then for the next one we can try the chisel which is port forwarding tool

First we have to set the IPs in our attacker machine

But first we have to get the Julio's ccache file from the linux machine

`

Then we will change the permission so that we can copy it using scp

Then we are going to export the ccache file so that we can connect to the dc01 as julio

Then just use proxychains4 from the home directory to connect to dc01

Last updated