An advantage of abusing Kerberos tickets is the ability to forge our own tickets. Let's see how we can do this using the OverPass the Hash or Pass the Key technique.
OverPass-The-Hash generate tokens from hashes or key
Mimikatz requires administrative rights to perform the Pass the Key/OverPass the Hash attacks, while Rubeus doesn't
Mimikatz - Extract Kerberos Keys
Then Pass the Key or OverPass the Hash
Mimikatz - Pass the Key or OverPass the Hash
Invoke-Mimikatz
SafetyKatz
Rubeus - Pass the Key or OverPass the Hash
No need elevation
Need elevation
Pass The Ticket
Rubeus
All in one
Import .kirbi
Base64 We can also use the base64 output from Rubeus or convert a .kirbi to base64 to perform the Pass the Ticket attack. We can use PowerShell to convert a .kirbi to base64.
Mimikatz
We can use the Mimikatz module misc to launch a new command prompt window with the imported ticket using the misc::cmd command
PowerShell Remoting
To create a PowerShell Remoting session on a remote computer, you must have administrative permissions, be a member of the Remote Management Users group, or have explicit PowerShell Remoting permissions in your session configuration.
Suppose we find a user account that doesn't have administrative privileges on a remote computer but is a member of the Remote Management Users group. In that case, we can use PowerShell Remoting to connect to that computer and execute commands.
The above command will open a new cmd window. From that window, we can execute Rubeus to request a new TGT with the option /ptt to import the ticket into our current session and connect to the DC using PowerShell Remoting.