Sapphire tickets
Last updated
Was this helpful?
Last updated
Was this helpful?
Sapphire tickets are similar to in the way the ticket is not forged, but instead based on a legitimate one obtained after a request. The difference lays in how the PAC is modified. The approach modifies the legitimate PAC. In the Sapphire ticket approach, the PAC of another powerful user is obtained through an trick. This PAC then replaces the one featured in the legitimate ticket. The resulting ticket is an assembly of legitimate elements, and follows a standard ticket request, which makes it then most difficult silver/golden ticket variant to detect.
Since Diamond tickets modify PACs on-the-fly to include arbitrary group IDs, chances are some detection software are (of will be) able to detect discrepancies between a PAC's values and actual AD relationships (e.g. a PAC indicates a user belongs to some groups when in fact it doesn't).
Sapphire tickets are an alternative to obtaining similar tickets in a stealthier way, by including a legitimate powerful user's PAC in the ticket. There will be no discrepancy anymore between what's in the PAC and what's in Active Directory.
The powerful user's PAC can be obtained through an trick.
From UNIX-like systems, 's (Python) script can be used for such purposes with the -impersonate
argument.
As of September 11th, 2023, this feature is in a pull request () awaiting to be merged. Nouser-id
ta bene 1: both the nthash and aeskey must be supplied.
Nota bene 2: the -user-id
argument will be used to build the "Requestor" PAC structure, which could be needed in up-to-date environments (see warning at the bottom of this page).
The arguments used to customize the PAC will be ignored (-groups
, -extra-sid
,-duration
), the required domain SID (-domain-sid
) as well as the username supplied in the positional argument (baduser
in this case). All these information will be kept as-is from the PAC obtained beforehand using the trick.
In 2021, Microsoft issued a patch () for (see ). The patch is explained a bit more in . When the patch entered its enforcement phase (Oct. 11th 2022), it made the Sapphire Ticket attack harder to conduct.
The patch introduced two new structures inside a TGT's PAC: "Requestor" (PAC_REQUESTOR
) and "Attributes" (PAC_ATTRIBUTES_INFO
). Those structures are now required in TGTs for all up-to-date environments after the patch enforcement phase, and a KDC_ERR_TGT_REVOKED
error is raised if a TGT is used without them.
Necessary updates were brought to offensive tooling like (PR# and ) and (PR# ).
However, since the Sapphire Ticket technique relies on a S4U2self + U2U service ticket request to obtain a privileged user's PAC, the PAC doesn't feature the two new "Requestor" and "Attributes" structures. This is probably because the two new structures are only included in TGT's PACs and not service tickets PACs.
When using the Sapphire Ticket technique to forge a TGT, if the two structures are missing from the forget ticket, a KDC_ERR_TGT_REVOKED
error will be raised in environments that have the patch installed.