AD Authentication
Dumping NTLM Hashes and Plaintext Credentials
NTLM authentication uses a challenge-response model, where a nonce/challenge encrypted using the user's NTLM hash is validated by the Domain Controller.
Dumping LM/NTLM hashes with Mimikatz
Requires local admin rights.
Other tools
Dumping Kerberos Tickets
Kerberos authentication uses a ticketing system, where a Ticket Granting Ticket (TGT) is issued by the Domain Controller (with the role of Key Distribution Center (KDC)) and is used to request tickets from the Ticket Granting Service (TGS) for access to resources/systems joined to the domain.
Hashes are stored in the Local Security Authority Subsystem Service (LSASS).
LSASS process runs as SYSTEM, so we need SYSTEM / local admin to dump hashes stored on target.
Dumping Kerberos TGT/TGS tickets with Mimikatz
See "Service Account Attacks" on how to abuse dumped tickets.
Last updated