The Silver Ticket attack involves gaining access to resources in a network using forged authentication tickets. It's equally damaging as the Golden Ticket attack. Using a silver ticket, an attacker can create multiple ticket granting service (TGS) tickets for a specific service without establishing communication with a domain controller (DC) in a network. In this blog, we'll discuss:

How a Silver Ticket attack is launched

To create a silver ticket, which can authenticate service requests illicitly, the attacker must get the password hash and the service principal name (SPN) of the targeted service account along with domain details such as the domain name and the domain SID.

Let's assume an attacker has compromised an end-user account in your network.

To launch a Silver Ticket attack, the attacker:

  1. Installs malicious software, such as Mimikatz, to steal the password hash and SPN of the service account.

  2. Executes the following command:

    Mimikatz “privilege::debug” “sekurlsa::logonpasswords” exit

    to compromise a service account with sensitive information.

  3. Creates the silver ticket using the obtained information. For example:

    • /domain - The complete domain name
    • /sid - Security Identifier of the Active Directory domain
    • /user - A user name to impersonate
    • /target - The complete name of the target server
    • /service - The complete name of the target service
    • /rc4 - The NTLM password hash
  4. Injects the created silver ticket into the cmd.exe session. Here's how a silver ticket looks:

    mimikatz “kerberos::golden /admin:Tom /id:1106 /domain:solutions.org /sid:S-1--67-7652348760-657943776-7675675989 /target:server.solutions.org /rc4:w4e68i0507gv078aj89fn65nh6n76g45 /service:cifs /ptt” exit

This silver ticket can now be used to request access to resources using usernames that don't exist in your network, making it difficult for you to detect the adversary.

Anomalies to look out for

You should monitor your network events constantly to identify the following anomalies:

Suspicious service requests

  1. First-time resource access requests by a user account

  2. Anomalous behavior from privileged user accounts

  3. Multiple and continuous accesses to a specific service

Mimikatz installation

  1. Threats detected by antivirus software

Malicious user behavior and data accumulation

  1. Accumulation of data at endpoints indicating potential data exfiltration attempts

  2. Unusual user behavior, such as requesting access to resources during unusual hours

Mitigating a Silver Ticket attack

Detecting the indicators of compromise (IoCs) of a Silver Ticket attack in your network at its initial stage can help you contain the attack. Because communication with the DC won't be detected, you need to constantly track the events occurring on the host level and analyze the log data to spot suspicious events. To do this, use a tool capable of searching, analyzing, and detecting malicious activities in individual hosts and correlating them as one incident. A security information and event management (SIEM) solution with log management, event correlation, and user and entity behavior analytics capabilities can help you detect the IoCs of a Silver Ticket attack easily.

If you want to see these features in action, download a 30-day, free trial of Log360, a ManageEngine SIEM solution.

Remediating a Silver Ticket attack

To remediate a Silver Ticket attack, you must change the service account password twice. This is because Active Directory stores the current and previous passwords of an account. You can remotely reset the passwords of the infected systems by executing the Reset-ComputerMachinePassword command in PowerShell. Ensure that all the infected systems are communicable when the process is initiated; if not, you may have to check for other infected systems and reset their passwords so no loopholes are left open for the attackers.

After eliminating the vulnerabilities from your network, perform patch management to keep attackers at bay. Revisit the permissions of user accounts, and make sure that you've adopted the principle of least privilege while assigning roles and permissions to users.

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

Expert Talks

     
     

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.