top of page

Pass-the-Ticket (PtT) Attack: Exploiting Kerberos Authentication

  • Writer: Akshay Jain
    Akshay Jain
  • Mar 17
  • 3 min read

In the vast realm of cybersecurity threats, Pass-the-Ticket (PtT) attacks stand as one of the most dangerous post-exploitation techniques used by adversaries. Leveraging stolen Kerberos tickets, attackers can maintain unauthorized access to systems without needing user credentials. In this blog, we will dissect PtT attacks, understand their technical mechanics, and explore defensive strategies against them.


Understanding Pass-the-Ticket (PtT) Attacks

What Is a Pass-the-Ticket Attack?

Pass-the-Ticket (PtT) is an attack technique where an adversary uses stolen Kerberos tickets to authenticate to services without knowing the actual user credentials. This technique allows lateral movement across networks while bypassing traditional authentication mechanisms.


The Role of Kerberos in Authentication

Kerberos is a network authentication protocol used by Windows Active Directory (AD) environments to provide secure authentication using tickets. It operates as follows:

  1. A user authenticates to a Key Distribution Center (KDC) and receives a Ticket Granting Ticket (TGT).

  2. The TGT is used to request Service Tickets (TGS) for accessing specific network services.

  3. The user presents the TGS to the requested service for authentication.


Since authentication relies on cryptographic tickets rather than passwords, attackers who obtain a valid ticket can impersonate users without needing their credentials.



Pass the ticket attack
Pass the ticket attack

Anatomy of a Pass-the-Ticket Attack

Initial Compromise

Attackers typically gain initial access through methods like:

  • Phishing emails with malicious payloads

  • Exploiting unpatched vulnerabilities

  • Weak or compromised credentials

Once inside the network, they escalate privileges to extract Kerberos tickets.


Extracting Kerberos Tickets

Using tools like Mimikatz, attackers can dump cached Kerberos tickets from a compromised machine:

klist

mimikatz "privilege::debug" "sekurlsa::tickets /export"


This allows them to extract TGTs or TGS tickets from system memory.


Passing the Ticket for Lateral Movement

With the stolen ticket, attackers can authenticate to other services as the compromised user:

klist purge

kerberos::ptt <ticketfile>


This bypasses the need for a password, allowing seamless access to network resources.


Persistence and Domain Dominance

Using privileged accounts (e.g., Domain Admin), attackers can maintain persistence by:

  • Creating rogue Service Principal Names (SPNs)

  • Generating Golden Tickets (for long-term access)

  • Deploying backdoors to maintain control


Real-World Examples

NotPetya Ransomware Attack (2017)

The NotPetya malware leveraged PtT techniques to spread laterally in Windows environments, allowing attackers to move through compromised networks undetected.


Target Breach (2013)

In the infamous Target data breach, attackers gained access to credentials and likely used PtT tactics to move laterally and exfiltrate millions of credit card records.


How to Defend Against PtT Attacks

Implement Credential Guard

  • Microsoft’s Windows Defender Credential Guard isolates secrets using Virtual Secure Mode (VSM), preventing ticket extraction


Monitor Kerberos Ticket Activity

  • Use SIEM tools to detect suspicious activity, such as:

    • Multiple ticket requests from a single host

    • TGT usage from unauthorized devices

    • Unusual service ticket requests


Limit Privileged Account Exposure

  • Reduce the number of privileged accounts, enforce Just-In-Time (JIT) access, and implement least privilege principles.


Enable Kerberos Armoring (FAST)

  • Flexible Authentication Secure Tunneling (FAST) encrypts Kerberos exchanges, making ticket theft significantly harder.


Use Endpoint Detection & Response (EDR) Solutions

  • Advanced EDR tools can detect and prevent ticket manipulation by monitoring process behavior and memory access.


Pass-the-Ticket attacks exemplify how attackers can exploit authentication mechanisms to move laterally and persist in a network. As defenders, understanding the techniques used in PtT attacks is crucial for implementing robust security measures. By deploying proactive monitoring, access restrictions, and advanced security controls, organizations can significantly reduce their risk exposure.


Happy cyber-exploration! 🚀🔒


Note: Feel free to drop your thoughts in the comments below - whether it's feedback, a topic you'd love to see covered, or just to say hi! Don’t forget to join the forum for more engaging discussions and stay updated with the latest blog posts. Let’s keep the conversation going and make cybersecurity a community effort!


-AJ


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page