While Golden Tickets are the nuclear option (forging TGTs with KRBTGT), Silver Tickets are the precision strike - forging service tickets (TGS) for specific services using the service account's hash. No KDC contact required.Related
Think of it this way: Golden Ticket = master key to the entire building. Silver Ticket = key to one specific room. Less powerful, but often all you need - and much stealthier since you never talk to the KDC.
No KDC Required
Silver Tickets are validated by the service itself, not the KDC. This means no Kerberos traffic to the DC - making detection much harder.
How Silver Tickets Work
Scope Limitation
Silver Tickets only grant access to the specific service you forge the ticket for. You can't use a CIFS silver ticket to access LDAP.
Requirements
Machine Accounts
Computer accounts ARE service accounts! The machine account hash (MACHINENAME$) can forge tickets for services running as SYSTEM on that machine - CIFS, HOST, HTTP, etc.
Common Service SPNs
CIFS is Your Friend
CIFS (Common Internet File System) silver tickets are most useful. They grant SMB access for file shares, and tools like PsExec use SMB under the hood.
Forging Silver Tickets
Mimikatz
Impacket (Linux)
Rubeus
Attack Scenarios
Scenario 1: File Share Access
Scenario 2: Database Access
Scenario 3: WinRM Access
Scenario 4: DC Access via CIFS
Golden vs Silver Tickets
| Aspect | Golden Ticket | Silver Ticket |
|---|---|---|
| Ticket Type | TGT | TGS |
| Key Required | KRBTGT hash | Service account hash |
| Scope | Entire domain | Single service |
| KDC Contact | Yes (to get TGS) | No |
| Detection | Easier (KDC logs) | Harder (service only) |
| Invalidation | Reset KRBTGT twice | Reset service password |
Detection & Defense
PAC Validation
By default, services trust the PAC (Privilege Attribute Certificate) in tickets without validating with the KDC. Enabling PAC validation adds overhead but catches silver tickets.
Silver Ticket Methodology
Silver Ticket Attack Flow
1
Obtain HashGet service account hash (Kerberoast, dump, etc.)
2
Identify TargetDetermine which service to access
3
Get Domain SIDwhoami /user or Get-ADDomain
4
Forge TicketUse Mimikatz/Rubeus/ticketer.py
5
InjectPass-the-Ticket into session
6
AccessConnect to service with forged ticket
Knowledge Check
Challenges
Key Takeaways
- Silver tickets forge TGS tickets for specific services
- Require service account hash, not KRBTGT
- No KDC contact = much stealthier than golden tickets
- Limited scope - one service per ticket
- Machine accounts work for services running as SYSTEM
- Reset service password to invalidate