InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

“The Sneaky Way Hackers Get into Your Network: Golden Ticket Attacks Explained in Layman’s Terms”

Paritosh
InfoSec Write-ups
Published in
3 min readMay 7, 2023

Are you worried about cyber attacks and hackers getting into your network? One of the sneakiest ways they can do it is through something called a golden ticket. It’s a type of attack that lets hackers take control of your systems and steal your data without you even knowing it. But don’t worry, we’re here to help you understand what golden ticket attacks are and how you can defend yourself against them, even if you’re not a tech expert. So buckle up and get ready to learn how to keep your network safe!

What are golden tickets?
Golden tickets are a type of attack that hackers use to get into your network. They do this by exploiting a weakness in a computer program called Kerberos, which is used to keep your network safe. Once the hackers have a golden ticket, they can do whatever they want in your network, like stealing your data or taking control of your systems.

Photo by Jingming Pan on Unsplash

How do golden ticket attacks work?
Golden ticket attacks typically begin with the attacker gaining access to a domain controller, either through a phishing attack, a stolen credential, or a vulnerability in the system. Once the attacker has access to the domain controller, they can use the Mimikatz tool to extract the Kerberos key for the domain’s service account. With…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Paritosh

CISSP | Sharing what I am learning to get it in a single place. | Linkedin -> https://www.linkedin.com/in/paritosh-bhatt/

No responses yet

Write a response