Overpass the hash
This kind of attack is similar to PtH (pass the hash) but applied to Kerberos networks.
When a user requests a TGT, they send a timestamp encrypted with an encryption key derived from their password. The algorithm used to derive this key can be either DES (disabled by default on current Windows versions), RC4, AES128 or AES256, depending on the installed Windows version and Kerberos configuration. If we have any of those keys, we can ask the KDC for a TGT without requiring the actual password, hence the name Pass-the-key (PtK).
We can obtain the Kerberos encryption keys from memory by using mimikatz with the following commands:
Depending on the available keys, we can run the following commands on mimikatz to get a reverse shell via Pass-the-Key (
nc64 is already available in THMJMP2 for your convenience):
If we have the RC4 hash:
If we have the AES128 hash:
If we have the AES256 hash:
Notice that when using RC4, the key will be equal to the NTLM hash of a user. This means that if we could extract the NTLM hash, we can use it to request a TGT as long as RC4 is one of the enabled protocols. This particular variant is usually known as Overpass-the-Hash (OPtH).