Golden Ticket Attack Explained: Kerberos Domain Takeover

golden ticket attack

Active Directory environments rely heavily on the Kerberos authentication protocol to manage identity and access across enterprise networks. While Kerberos is designed to provide secure and efficient authentication, the protocol contains structural assumptions that attackers can exploit once they gain privileged access.

One of the most powerful attacks targeting this trust model is the Golden Ticket attack. In this scenario, an attacker forges a Kerberos Ticket Granting Ticket (TGT) using the KRBTGT account hash, allowing them to impersonate any user and access virtually any resource within the domain.

Because Kerberos authentication relies on cryptographic signatures rather than continuous credential verification, a forged ticket that contains a valid KRBTGT signature will be trusted by domain controllers. This allows attackers to bypass many traditional authentication controls and maintain long-term persistence.

Golden Ticket attacks typically appear in the post exploitation phase of advanced intrusions, often after attackers compromise a domain controller or extract sensitive credentials. Once executed successfully, the attacker effectively controls the identity infrastructure of the organization.

For security teams and SOC analysts, understanding how Golden Ticket attacks operate is critical for detection engineering, incident response, and Active Directory hardening.

What Is a Golden Ticket Attack?

golden ticket attack

A Golden Ticket attack is a technique that abuses the Kerberos authentication system used by Microsoft Active Directory. The attack allows adversaries to generate forged authentication tickets that grant unrestricted access to domain resources.

In a standard Kerberos environment, authentication begins when a user logs in and requests a Ticket Granting Ticket from the Key Distribution Center located on the domain controller. The KDC validates the user credentials and issues a signed TGT that the client later uses to request access to network services.

The security of this process depends entirely on the KRBTGT service account, which signs all Kerberos tickets generated by the domain controller. If an attacker obtains the password hash of this account, they can generate their own tickets offline.

These forged tickets contain arbitrary user identities, privilege levels, and ticket lifetimes. Because the ticket signature appears valid, domain controllers treat it as legitimate authentication.

Key characteristics of a Golden Ticket attack include:

  • Forged Kerberos Ticket Granting Tickets
  • Domain administrator impersonation
  • Authentication without contacting the domain controller
  • Extremely long ticket validity periods
  • Persistent domain access

The attack essentially bypasses identity verification because Kerberos trusts the cryptographic signature attached to the ticket.

Once attackers possess a valid Golden Ticket, they can request service tickets for any system, including file servers, databases, and domain controllers.

This capability effectively provides domain-wide administrative control.

Many online threats today are linked to account takeover fraud, where attackers gain access to your account using stolen login details.

Organisations should prepare early for APRA CPS 230 to make sure their operational risk, outsourcing, and business continuity controls meet regulatory expectations.

If you want to improve your security setup, read our guide on cybersecurity for law firms to see the best protection strategies for legal professionals.

How Kerberos Authentication Works in Active Directory

golden ticket attack

Understanding the Golden Ticket attack requires a clear understanding of the Kerberos authentication workflow inside an Active Directory domain.

Kerberos operates as a ticket-based authentication system that allows users to access services without repeatedly sending passwords across the network.

The authentication process relies on three primary components.

ComponentRole
ClientUser or system requesting authentication
Key Distribution CenterThe resource the user wants to access
Service ServerResource the user wants to access

The Kerberos authentication workflow typically follows these steps:

  1. A user logs into a domain-joined system
  2. The client sends an authentication request to the Key Distribution Center
  3. The KDC verifies credentials and issues a Ticket Granting Ticket
  4. The TGT is encrypted using the KRBTGT account key
  5. The client uses the TGT to request service tickets for domain resources

This design reduces network overhead because the user’s password is not repeatedly transmitted. Instead, the client simply presents a previously issued ticket.

However, the system assumes that the KRBTGT account remains secure. If attackers obtain the hash of this account, they can generate forged tickets that bypass the normal verification process.

Because Kerberos relies on cryptographic trust rather than real-time identity checks, the domain controller will accept a forged ticket as legitimate if it contains a valid signature.

This trust model is precisely what attackers exploit during a Golden Ticket attack.

How Attackers Obtain the KRBTGT Hash

Before generating a Golden Ticket, attackers must obtain the NTLM hash of the KRBTGT account, which functions as the master signing key for Kerberos authentication.

This typically occurs after attackers gain privileged access to the Active Directory environment.

Several techniques are commonly used to extract the KRBTGT hash.

Credential Dumping

Attackers frequently dump credentials from memory using tools such as Mimikatz. This tool can extract plaintext passwords and NTLM hashes from the LSASS process in Windows systems.

NTDS.dit Database Extraction

The Active Directory database file NTDS.dit contains credential hashes for domain accounts. If attackers obtain a copy of this file from a domain controller, they can extract the KRBTGT hash.

DCSync Attack

Another common method is the DCSync attack. This technique abuses Active Directory replication protocols to impersonate a domain controller and request password hashes from legitimate domain controllers.

Privileged Access Abuse

Attackers who already hold Domain Admin privileges can query the directory directly to obtain credential information.

Once the KRBTGT hash and domain SID are known, attackers have everything required to forge Kerberos tickets.

These elements form the foundation of the Golden Ticket attack.

How Attackers Generate a Golden Ticket

After obtaining the KRBTGT hash, attackers can begin creating forged Kerberos tickets.

Specialized offensive tools automate this process.

Common tools include:

  • Mimikatz
  • Rubeus
  • Impacket
  • Kekeo

Using these tools, attackers create a Ticket Granting Ticket containing custom attributes such as username, group membership, and expiration time.

Typical information required to create a Golden Ticket includes:

ParameterDescription
Domain NameTarget Active Directory domain
Domain SIDSecurity identifier of the domain
KRBTGT HashKerberos signing key
UsernameIdentity to impersonate

Once generated, the ticket is injected into the attacker’s session memory. From that moment onward, the attacker can authenticate to domain services without interacting with the domain controller.

The forged ticket effectively acts as a master credential that grants domain access.

Attackers often create tickets with extremely long expiration times so they can maintain persistence even after password resets.

Because the ticket itself contains the identity and privileges of the user, it allows attackers to impersonate highly privileged accounts such as Domain Administrator.

Golden Ticket vs Silver Ticket Attacks

Golden Ticket attacks are frequently compared with another Kerberos attack called the Silver Ticket attack. Although both involve forged tickets, their scope and impact differ significantly.

FeatureGolden Ticket AttackSilver Ticket Attack
TargetEntire Active Directory domainIndividual service
Required credentialKRBTGT hashService account hash
Privilege levelService-specific accessService specific access
Detection difficultyHighModerate
PersistenceLong termLimited

Golden Ticket attacks affect the entire authentication infrastructure because the forged ticket is recognized by domain controllers.

Silver Tickets only grant access to specific services such as file servers or databases.

For this reason, Golden Ticket attacks represent a much higher risk and often indicate a severe domain compromise.

Indicators of a Golden Ticket Attack

golden ticket attack

Golden Ticket attacks can be difficult to detect because the authentication tickets appear cryptographically valid.

However, careful analysis of authentication logs and behavioral patterns can reveal anomalies.

Security teams should monitor for the following indicators.

Unusually Long Ticket Lifetimes

Kerberos tickets typically have defined expiration periods. Attackers sometimes create tickets with extremely long lifetimes.

Service Tickets Without TGT Requests

A suspicious pattern occurs when service ticket requests appear in logs without a corresponding TGT request.

Privileged Logon Events

Unexpected privileged logons, especially those involving Domain Admin group membership, may indicate ticket abuse.

Important Windows event IDs include:

Event IDMeaning
4768Kerberos authentication ticket request
4769Kerberos service ticket request
4624Successful logon
4672Special privileges assigned

SOC teams often correlate these logs with endpoint telemetry and SIEM analytics to detect suspicious patterns.

Detection Techniques for Golden Ticket Attacks

Effective detection requires monitoring identity activity across multiple data sources.

Security teams typically combine endpoint monitoring, authentication logs, and SIEM correlation rules.

Key detection techniques include:

Kerberos Ticket Analysis

Monitor for anomalies in ticket attributes such as:

  • Unusual encryption types
  • Invalid domain fields
  • Extremely long expiration times

Privileged Access Monitoring

Track abnormal usage of Domain Admin privileges across endpoints.

Authentication Behavior Analytics

Identity analytics systems can detect deviations from typical login behavior.

SIEM Correlation Rules

Example detection logic:

  • Service ticket request without preceding TGT request
  • Privileged logon from an unusual host
  • Authentication using disabled accounts

Advanced detection platforms combine log data, network telemetry, and behavioral analytics to identify forged ticket activity.

Preventing Golden Ticket Attacks

Preventing Golden Ticket attacks requires protecting the identity infrastructure of Active Directory.

Several defensive strategies significantly reduce the risk.

KRBTGT Password Rotation

Resetting the KRBTGT password invalidates previously issued tickets. The password must be rotated twice to fully eliminate forged tickets.

Tiered Administrative Access

Limiting privileged access reduces the chance of domain compromise.

Endpoint Security Controls

Credential protection mechanisms such as:

  • LSASS protection
  • Credential Guard
  • EDR monitoring

help prevent credential dumping.

Active Directory Monitoring

Continuous monitoring of authentication logs allows early detection of suspicious activity.

Organizations that treat identity systems as critical security infrastructure are better positioned to prevent these attacks.

Golden Ticket Attack Lifecycle

PhaseAttacker ActivityDefender Opportunity
Initial compromiseEndpoint intrusionEndpoint detection
Privilege escalationDomain admin accessPrivileged access monitoring
Credential extractionKRBTGT hash theftCredential protection
Ticket forgingCreate Golden TicketSIEM detection
PersistenceDomain controlKRBTGT rotation

MITRE ATT&CK Mapping for Golden Ticket Attacks

Golden Ticket attacks are formally categorized in the MITRE ATT&CK framework as T1558.001 under the Credential Access and Defense Evasion tactics. This classification highlights the role of Kerberos ticket forgery in enabling attackers to bypass identity verification and maintain unauthorized access.

Understanding the MITRE mapping helps SOC teams align detection engineering with threat intelligence frameworks used across the industry.

MITRE TechniqueDescription
T1558Steal or Forge Kerberos Tickets
T1558.001Golden Ticket
T1003Credential Dumping
T1078Valid Accounts

Golden Ticket attacks are rarely isolated events. They typically appear as part of a broader attack chain that includes credential dumping, privilege escalation, and lateral movement. Once attackers obtain the KRBTGT hash, they can forge tickets that grant domain administrator privileges.

From a defensive perspective, mapping alerts to MITRE techniques allows security teams to create structured detection strategies. For example, a credential dumping alert followed by unusual Kerberos activity may indicate a high probability of ticket forgery attempts.

MITRE mapping also assists threat hunting teams in identifying related techniques that attackers may use in conjunction with Golden Ticket attacks. These may include Kerberos ticket extraction, pass-the-ticket attacks, and service ticket manipulation.

Organizations that incorporate MITRE-based detection frameworks often achieve better visibility into identity-based attacks because they analyze activity across multiple attack stages instead of focusing on a single alert.

Splunk Detection Strategy for Golden Ticket Attacks

Security operations teams frequently rely on SIEM platforms such as Splunk to detect suspicious Kerberos authentication activity.

Golden Ticket detection in Splunk usually involves analyzing Windows security logs generated by domain controllers. These logs contain detailed information about Kerberos ticket requests and authentication events.

Several event IDs are particularly important for monitoring potential Golden Ticket activity.

Event IDDescription
4768Kerberos authentication ticket request
4769Kerberos service ticket request
4624Successful logon
4672Privileged logon

SOC analysts typically create correlation rules that identify anomalies in these events.

Common detection patterns include:

• Service ticket requests without a preceding Ticket Granting Ticket request
• Privileged logons occurring from unexpected hosts
• Kerberos tickets with abnormal encryption types
• Tickets with extremely long validity periods

Example detection logic for suspicious Kerberos activity:

index=windows EventCode=4769
| stats count by user, src_ip
| where count > 50

This query highlights accounts generating large numbers of service ticket requests, which may indicate abnormal authentication behavior.

Another useful detection strategy involves correlating privileged logon events.

index=windows EventCode=4672
| stats count by user, host

If privileged logons appear on hosts where administrators normally do not authenticate, the activity should be investigated.

Effective Golden Ticket detection often requires combining multiple data sources, including endpoint telemetry, authentication logs, and identity analytics systems.

Real World Incident Scenarios Involving Golden Ticket Attacks

golden ticket attack

Golden Ticket attacks have appeared in numerous real-world cyber intrusion cases involving advanced threat actors.

These attacks are commonly used after attackers achieve domain administrator privileges, allowing them to maintain persistent access even if defenders attempt remediation steps such as password resets.

A typical intrusion scenario might follow this sequence:

  1. Initial access through phishing or exploitation
  2. Privilege escalation on compromised systems
  3. Credential dumping from LSASS memory
  4. Extraction of the KRBTGT account hash
  5. Creation of forged Kerberos tickets
  6. Lateral movement across domain systems

Once attackers generate a Golden Ticket, they can authenticate to any service inside the domain without needing to reauthenticate.

This allows them to perform several malicious actions, including:

• Accessing sensitive file shares
• Deploying malware across endpoints
• Creating new administrative accounts
• Exfiltrating confidential data

Because the forged ticket may remain valid for long periods, attackers can return to the network even after incident response teams believe the breach has been contained.

This persistence capability makes Golden Ticket attacks particularly dangerous for large enterprise environments.

Security team, therefore, re treat KRBTGT compromise as a critical security incident requiring immediate containment and remediation.

Best Practices for Active Directory Hardening

Preventing Golden Ticket attacks requires strengthening the security posture of the Active Directory environment.

Since the KRBTGT account acts as the cryptographic root of trust for Kerberos authentication, protecting privileged access is the most important defensive strategy.

Security teams should implement the following best practices.

Restrict Domain Administrator Privileges

Excessive administrative privileges increase the likelihood of credential compromise. Organizations should limit Domain Admin accounts and monitor their usage carefully.

Implement Tiered Administrative Access

A tiered administration model separates administrative roles across different systems, reducing the risk that attackers can escalate privileges.

Enable Credential Protection Mechanisms

Modern Windows environments include security features that prevent credential theft from system memory.

Examples include:

• Windows Credential Guard
• LSASS protection
• Secure administrative workstations

Monitor Authentication Activity

Continuous monitoring of authentication logs helps detect suspicious Kerberos activity early.

Organizations should analyze:

• Privileged logon events
• Kerberos ticket requests
• Unusual authentication patterns

Perform Regular KRBTGT Password Rotation

Rotating the KRBTGT password periodically reduces the risk that previously stolen hashes remain usable.

The reset process must be performed twice to invalidate all existing Kerberos tickets.

Implementing these defensive practices significantly reduces the attack surface associated with Kerberos authentication.

The escalation of the israel iran war has raised global cybersecurity concerns, as attacks linked to geopolitical tensions often spread beyond the original conflict zone.

Final Thoughts

Golden Ticket attacks represent one of the most severe threats to Active Directory environments because they undermine the trust model of Kerberos authentication.

Once attackers obtain the KRBTGT account hash, they can forge authentication tickets that grant domain-wide access and allow them to impersonate any user. Traditional security controls may fail to detect this activity because the forged tickets appear legitimate.

Organizations must therefore treat identity infrastructure as a primary security boundary. Strong privileged access controls, continuous monitoring of authentication events, and periodic KRBTGT password rotation are essential for reducing the impact of this attack.

For SOC teams, detection engineering plays a critical role. Correlating Kerberos logs, identifying abnormal authentication patterns, and monitoring privileged account usage can reveal early signs of compromise before attackers establish long term persistence.

In modern enterprise environments, protecting identity systems is no longer optional. It is one of the most important elements of defensive cybersecuritystrategy.

If you are new to automation platforms, you should first learn what is n8n so you understand how workflows, credential storage, and integrations work before securing your environment.

Frequently Asked Questions

What is the KRBTGT account in Active Directory?

The KRBTGT account is a built-in service account used by the Kerberos Key Distribution Center to sign and encrypt Ticket Granting Tickets issued during authentication.

Why is the Golden Ticket attack dangerous?

The attack allows attackers to forge Kerberos authentication tickets, enabling them to impersonate any user and access domain resources without real authentication.

What tools are used for Golden Ticket attacks?

Security researchers frequently observe tools such as Mimikatz, Rubeus, and Impacket being used to generate forged Kerberos tickets.

How can organizations detect Golden Ticket attacks?

Detection relies on analyzing Kerberos authentication logs, identifying abnormal ticket lifetimes, and correlating suspicious logon activity in SIEM platforms.

How do you stop a Golden Ticket attack?

Resetting the KRBTGT account password twice invalidates all existing Kerberos tickets and removes forged authentication tokens created by attackers.

Picture of Majid Shahmiri

Majid Shahmiri

Majid Shahmiri

Majid is a cybersecurity professional with 10+ years of experience in SOC consulting, threat intelligence, and cloud security. He has worked with global enterprises including IBM, Mercedes-Benz, and Core42, helping organizations strengthen their defenses against evolving threats. Through CyberLad, he shares practical security insights to empower businesses. Outside of work, Majid is passionate about mentoring young professionals entering the cybersecurity field.