Pass the Ticket from Linux
π― Overview
Key Concepts
π§ Linux Active Directory Integration
Common Integration Methods
# Authentication services
β
SSSD (System Security Services Daemon)
β
Winbind (Samba component)
β
FreeIPA with AD trust
β
Direct Kerberos configurationIdentifying Domain-Joined Linux Machines
Method 1: Using realm command
Method 2: Process inspection
Method 3: Configuration files
π Keytab Files
What are Keytab Files?
Finding Keytab Files
Search by filename pattern
Search in automated scripts
Keytab File Analysis
Reading keytab information
Using keytab for authentication
Extracting Secrets from Keytab Files
KeyTabExtract Tool
Hash Cracking
πΎ ccache Files (Credential Cache)
Understanding ccache Files
Finding ccache Files
Environment variable check
Search /tmp directory
Abusing ccache Files
Root privilege requirement
Importing ccache files
π οΈ Essential Linux Kerberos Tools
kinit - Request tickets
klist - List tickets
kdestroy - Remove tickets
π Using Linux Attack Tools with Kerberos
Requirements for Remote Attacks
Setting up Attack Environment
/etc/hosts configuration
Proxychains configuration
Chisel tunnel setup
Impacket with Kerberos
Basic usage
Example session
Evil-WinRM with Kerberos
Prerequisites installation
Configuration file
Usage example
π Ticket Conversion (ccache β kirbi)
impacket-ticketConverter
ccache to kirbi (Linux β Windows)
kirbi to ccache (Windows β Linux)
Using converted tickets
π Advanced Tool: Linikatz
Overview
Installation and usage
What Linikatz extracts
Example output
π― HTB Academy Lab Exercises
Lab Environment
Exercise 1: Initial Access
Exercise 2: Group Identification
Exercise 3: Keytab Discovery
Exercise 4: Keytab Hash Extraction
Exercise 5: Service Account Discovery
Exercise 6: Privilege Escalation
Exercise 7: ccache File Abuse
Exercise 8: Computer Account Ticket
Key Lab Details
Exact File Locations
Hash Values and Passwords
ccache File Patterns
Computer Account Authentication
Flag Answers Summary
Success Validation
Optional Exercises
Proxychains + Evil-WinRM Setup
Cross-Platform Ticket Conversion
π‘οΈ Detection and Defense
Detection Indicators
Defensive Measures
π Related Techniques
Attack Chain Summary
Tool Comparison
Tool
Purpose
Requirements
Output Format
π References
Last updated