The Hacker Recipes
GitHub
Twitter
Exegol
Tools
Search
⌃
K
Links
Introduction
Active Directory
Reconnaissance
Movement
Credentials
MITM and coerced auths
NTLM
Kerberos
Pre-auth bruteforce
Pass the key
Overpass the hash
Pass the ticket
Pass the cache
Forged tickets
ASREQroast
ASREProast
Kerberoast
Delegations
Shadow Credentials
UnPAC the hash
Pass the Certificate
sAMAccountName spoofing
SPN-jacking
DACL abuse
Group policies
Trusts
Netlogon
Certificate Services (AD-CS)
SCCM / MECM
Exchange services
Print Spooler Service
Built-ins & settings
Persistence
Web services
Reconnaissance
Configuration
Accounts and sessions
User inputs
Systems & services
Reconnaissance
Initial access (protocols)
Initial access (phishing)
Privilege escalation
Pivoting
Evasion
(AV) Anti-Virus
🛠️ (EDR) Endpoint Detection and Response
🛠️ Physical
Locks
Networking
Machines
Super secret zones
🛠️ Intelligence gathering
CYBINT
OSINT
GEOINT
🛠️ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
🛠️ mobile apps
Android
iOS
Powered By
GitBook
Pass the cache
This technique is equivalent to pass the ticket. Instead of using Kerberos tickets from, or found on, Windows systems, it's based of UNIX-like formatted tickets that serve the exact same purpose.
Pass the ticket
Previous
Pass the ticket
Next
Forged tickets
Last modified
2mo ago