{"id":83940,"date":"2026-02-05T02:14:00","date_gmt":"2026-02-05T02:14:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83940"},"modified":"2026-03-11T12:02:49","modified_gmt":"2026-03-11T12:02:49","slug":"kerberos-offensive-playbook-enumeration-ticket-abuse","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/","title":{"rendered":"Kerberos Offensive Playbook: Enumeration, Targeting, and Ticket Abuse"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83940\" class=\"elementor elementor-83940\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a33bcae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a33bcae\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c64d9b8\" data-id=\"c64d9b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b04acf elementor-widget elementor-widget-text-editor\" data-id=\"1b04acf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kerberos is at the core of access management in most Windows domains, and tickets serve as the tokens that enable clients to access specific services. Kerberos ticket forging is a high-value capability for red teams, enabling them to understand authentication mechanisms in Active Directory environments. For ethical hackers, forging these tickets (Golden Ticket and Silver Ticket) replaces noisy credential replay with cleaner cryptographic impersonation, enabling stealthy persistence, fast lateral movement, and the ability to bypass password theft defenses. Golden Tickets are forged Ticket Granting Tickets (TGTs) used for broad impersonation. Silver Tickets are forged service tickets that focus on access bypass.<\/p><p>This article provides a playbook for the red team, explaining ticket mechanisms, hacking prerequisites, trade-offs between the Golden and Silver approaches, best practices for Capture the Flags (CTFs) and simulations, and more. It will also focus on safe simulation using OPSEC-enabled workflows.<\/p><p>Emphasizing the importance of enumerating permissions, the article also provides valuable insights into the controls associated with tickets, often a decisive advantage in both <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/capture-the-flag-ctf-cybersecurity\/\">CTF challenges<\/a> and real-world assessments. Additionally, it highlights key tools involved in Active Directory penetration testing and the role of CPENT in empowering professionals through its hands-on, skill-building training.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e284c67 elementor-widget elementor-widget-text-editor\" data-id=\"e284c67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What Is Kerberos?<\/h2><p>Kerberos is a ticket-based protocol that relies on a trusted third party, known as the Key Distribution Center (KDC). In Active Directory, the Domain Controller (DC) hosts the KDC components, the Authentication Service (AS), and the Ticket Granting Service (TGS). A user needs to access the AS to gain a Ticket Granting Ticket (TGT), which is then presented to the TGS to get service tickets for specific Service Principal Names (SPNs). These tickets contain encrypted session keys and authenticators and are signed using keys derived from account passwords or domain-wide key material. The KRBTGT account, which is a built-in service account in Active Directory, stores the key used to sign TGTs, while service account keys sign service tickets. Because the tickets have set lifetimes, controlling these signing keys or service account hashes allows an attacker to create fake tickets that the domain will trust.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-807ec0f elementor-widget elementor-widget-text-editor\" data-id=\"807ec0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Golden vs Silver: Pen Testing Prerequisites and Outcomes<\/h2> \n\n<p>Forging Golden Tickets requires access to the domain signing key material associated with the KRBTGT account. Access to that material allows you to forge a TGT for almost any identity and request service tickets for any SPN. Thus, this provides the red team with domain-wide impersonation capabilities and prolonged persistence. However, Golden Ticket attacks are costly because obtaining KRBTGT-level material requires deep access, such as extracting the NTDS database or performing privileged credential dumps, both of which demand significant time and resources.<\/p> \n\n<p>Silver Tickets require you to have the target service account hash for the SPN that you want to impersonate. This access lets you forge TGS tickets for specific services without querying the KDC. As a result, you get a targeted and stealthy service access. Silver Tickets are often preferable when you need to access a specific resource and want to minimize noise. This approach is commonly used in CTFs and in red-team objectives with a defined scope, as service account hashes are sometimes easier to obtain.<\/p> \n\n<p><i>\u201cThe Silver Ticket approach is best for targeted and low-noise tasks, while the Golden Ticket approach is best for domain-wide persistence if you have deep access.\u201d<\/i><\/p> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8f92b elementor-widget elementor-widget-text-editor\" data-id=\"3e8f92b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Red-Teaming Guideline: An OPSEC-Aware Workflow<\/h2><p>This high-level playbook outlines the steps to follow during an engagement without disclosing any sensitive details:<\/p><ol><li><strong>Objective and Scope:<\/strong> Define proper objectives (persistence, file access, or privilege escalation), and create a list of approved hosts, accounts, duration, rollback plan, etc.<\/li><li><strong>Initial Access:<\/strong> Gain a foothold via phishing, a test account, or sandbox; Collect only the required credentials and log everything.<\/li><li><strong>Discovery and Mapping:<\/strong> Enumerate domain topology, privileged groups, SPNs, and object access control lists (ACLs); methodical mapping helps you identify the accounts with permissions that you need.<\/li><li><strong>Target Identification:<\/strong> Pick an account with the lowest privileges, whose ticket yields the desired objective. Often, a service account with access to a share or a vulnerable application account can be used.<\/li><li><strong>Reconnaissance:<\/strong> Identify the path where hashes or key material may exist. Examples include service configuration files, backups, or memory on privileged hosts. Be sure to avoid bulk exfiltration and validate presence with small reads.<\/li><li><strong>Simulation:<\/strong> To generate telemetry that defenders can validate, simulate ticket usage using established red-team frameworks in a controlled environment. Avoid publishing signatures or raw keys in reports.<\/li><li><strong>Action and Measurement:<\/strong> Use forged or simulated tickets to access services, enumerate data, or move laterally; capture DC logs, service logs, and endpoint traces to measure impact.<\/li><li><strong>Cleanup and Evidence Handover:<\/strong> Delete artifacts, remove temporary accounts, and provide logs and a timeline to the blue team.<\/li><\/ol><p>This method reveals vulnerabilities while maintaining operational safety and security. It features a compact design and focuses on collecting valuable logs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dc5838 elementor-widget elementor-widget-text-editor\" data-id=\"7dc5838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>OPSEC-Aware Detection Awareness for Pen Testers<\/h2> \n\n<p>Understanding how the blue team detects your footprint allows you to improve your stealth and the value of your report. Observing these defender signals will enable you to design lower-noise attacks, and identify and report the gap in detection:<\/p> \n\n<ul> \n\n<li><strong>DC Kerberos Events:<\/strong> The blue team looks for irregularities between ticket issuance and service consumption.<\/li> \n\n<li><strong>Unusual Ticket Lifetimes:<\/strong> Tickets that exceed normal durations are marked as high-value anomalies.<\/li> \n\n<li><strong>Service Access from Unexpected Hosts:<\/strong> Host-service baseline violations will flag lateral surprises.<\/li> \n\n<li><strong>LSASS or Ticket Cache Reads:<\/strong> Endpoint tools that access ticket caches or memory are flagged.<\/li> \n\n<\/ul> \n\n<p>Here, Silver Tickets can be used to reduce KDC chatter and limit host footprint. It is essential to capture your own telemetry so that alert failures can be clearly demonstrated.<\/p> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dde0a1 elementor-widget elementor-widget-text-editor\" data-id=\"4dde0a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Practical Trade-Offs and Red-Team Tips<\/h2> \n\n<p>Some of the best practices for deciding the correct approach, reducing noise, and reporting can be listed as follows:<\/p> \n\n<ul> \n\n<li><strong>Golden vs. Silver Pick:<\/strong> Use Golden when the engagement justifies domain-level persistence, and you can manage rollback. Select Silver if you need stealthy, targeted service access.<\/li> \n\n<li><strong>Minimize Noisy Actions:<\/strong> Use focused reads and brief memory checks rather than dumping many credentials.<\/li> \n\n<li><strong>Account Focus:<\/strong> Understand each user\u2019s permissions by mapping corresponding access to resources, revealing the shortest path to the objective.<\/li> \n\n<li><strong>Artifact Hygiene:<\/strong> Always remember to clean up keys, forged tickets, or elevated artifacts and documents from the environment after testing.<\/li> \n\n<li><strong>Reporting Discipline:<\/strong> Include clear telemetry, timestamps, and host identifiers so defenders can reconstruct the chain without needing raw keys.<\/li> \n\n<\/ul> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd3fc59 elementor-widget elementor-widget-text-editor\" data-id=\"fd3fc59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Case Study: CPENT Challenge for Both Silver and Golden Tickets Simulation<\/h2><h3>Context and Goal<\/h3><p>A CPENT challenge for Active Directory end-to-end ticket-based techniques was designed to perform both reconnaissance for targeted access and obtain domain-level persistence. The objective was to produce clear telemetry to indicate CTF success and for later analysis. All actions were performed in a controlled laboratory environment and documented for reporting purposes.<\/p><h3>Actions Taken<\/h3><p>The <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/\" target=\"_blank\" rel=\"noopener\">penetration testing<\/a> began with thorough environment mapping, where users, SPNs, and service account permissions were enumerated to identify the shortest privilege path to the target. For targeted access, they located a service account hash on an application host and used a Silver Ticket simulation to request a service ticket for its SPN; this allowed access to a protected share and retrieval of a proof file. Later in the exercise, the penetration tester obtained a simulated domain signing material from an NTDS snapshot and generated a Golden Ticket. Using the forged TGT, they requested service tickets across multiple hosts to measure persistence and acceptance.<\/p><h3>Outcome and Inference<\/h3><p>The exercises produced DC and service logs that showed service access without matching TGT issuance for the Silver case and a measurable persistence window for the Golden case. It is essential to map the attack surface first, which helps understand each user\u2019s permissions, revealing which accounts to target for the shortest and quietest ticket paths. Silver Tickets proved ideal for focused, low-footprint objectives, while Golden Tickets demonstrated domain-wide persistence when deep access was available. The captured telemetry was replayable and valuable for post-challenge analysis and reporting.<\/p><h3>CTF Relevance Tips<\/h3><ul><li>As ticket mechanics are central to many Active Directory CTF rooms, recognizing which account to target is often the decisive move.<\/li><li>Map the attack surface first, as enumerating users and their permissions lets you know which account tickets will give you the access you need.<\/li><li>Mapping the environment is a high-leverage step that converts reconnaissance into a clear exploitation path.<\/li><li>Practice in labs, then apply the exact mapping in timed CTF challenges to shave off solution time.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5294b3c elementor-widget elementor-widget-text-editor\" data-id=\"5294b3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Key Tools for Active Directory Red Teaming<\/h2> \n\n<ul> \n\n<li><strong>BloodHound\/SharpHound:<\/strong> It is a graph-based mapping and collection suite that first uses SharpHound to collect Active Directory relationships and permissions. The obtained data is then loaded into BloodHound to find the shortest attack paths and prioritize targets.<\/li> \n\n<li><strong>Rubeus:<\/strong> It is used in Kerberos operations and ticket handling environment for enumerating tickets, requesting renewals, and exercising ticket workflows to validate Silver and Golden Ticket scenarios in controlled labs.<\/li> \n\n<li><strong>Impacket:<\/strong> It is a protocol and credential-focused toolkit with scripts for SMB, Kerberos, and LDAP interactions. It is helpful for authenticated command execution, lateral movement tests, and proving access paths safely.<\/li> \n\n<li><strong>Mimikatz:<\/strong> It is a credential and ticket extraction tool that extracts password hashes, Kerberos tickets, and key material from memory to validate ticket forging paths. Use it only in lab or explicitly authorized contexts because it is noisy and widely flagged by detection tools.<\/li> \n\n<\/ul> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a712601 elementor-widget elementor-widget-text-editor\" data-id=\"a712601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Conclusion<\/h2> \n\n<p>Golden and Silver Tickets are elite tools for red teams; use Silver for narrow, stealthy goals and Golden for broad persistence when the engagement supports it. Favor low-noise actions; avoid large credential dumps, and instead, use focused reads and brief memory checks to prove access. Prioritize enumeration; knowing each user\u2019s permissions tells you which ticket to aim for and often unlocks the whole box in CTFs and real assessments. Use practical tools such as BloodHound\/SharpHound, Rubeus, Impacket, and Mimikatz in lab or explicitly authorized contexts to validate paths and capture replayable telemetry. Practice in sandboxed labs and pursue structured training, such as CPENT, to build safe and professional skills. CPENT provides hands-on labs and scoring discipline that help convert these concepts into repeatable, professional skills.<\/p> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc9eb3e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc9eb3e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6d5376\" data-id=\"d6d5376\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36fa025 tags-cloud elementor-widget elementor-widget-heading\" data-id=\"36fa025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tags<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3192dfa tags-cloud elementor-widget elementor-widget-post-info\" data-id=\"3192dfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f2e3860 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/kerberos-golden-ticket-silver-ticket-t1558-active-directory-red-team-ctf-opsec-persistence-lateral-movement-cpent\/\" class=\"elementor-post-info__terms-list-item\">Kerberos; Golden Ticket; Silver Ticket; T1558; Active Directory; Red Team; CTF; OPSEC; Persistence; Lateral Movement; CPENT<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38b9447 tags-cloud elementor-widget elementor-widget-heading\" data-id=\"38b9447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Author<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-558ea6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"558ea6b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cf6bf14\" data-id=\"cf6bf14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d1a974 elementor-widget elementor-widget-image\" data-id=\"3d1a974\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/headshot-1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-image-83944\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6c5aa0 elementor-widget elementor-widget-heading\" data-id=\"f6c5aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Omar Tamer<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d338b03 elementor-widget elementor-widget-text-editor\" data-id=\"d338b03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Red Team &amp; Penetration Testing Specialist<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ca5bbfd\" data-id=\"ca5bbfd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493707 elementor-widget elementor-widget-text-editor\" data-id=\"2493707\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.linkedin.com\/in\/omar-tamer-1a986b2a7\/\" target=\"_blank\" rel=\"noopener\">Omar Tamer<\/a> is a red team and penetration testing specialist with a bachelor\u2019s degree in business information systems. He conducts full-scope security assessments across web, network, Active Directory, and OT\/IoT environments and holds multiple industry-recognized certifications, including CEH Master, CPENT, and LPT Master from EC-Council; eJPT from INE Security; and PCEP from the Python Institute. In addition to serving as an EC-Council exam item writer, he has developed offensive security tools, including Packet-Whiz (a network forensics analyzer) and OTSec (an OT\/IoT offensive toolkit), to support research and training. Ranked among the top players in various CTF platforms, he is passionate about advancing security research and aspires to publish original zero-day CVEs accredited to him.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-aad0608 elementor-widget elementor-widget-html\" data-id=\"aad0608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"application\/ld+json\">\r\n{\r\n  \"@context\": \"https:\/\/schema.org\",\r\n  \"@type\": \"Person\",\r\n  \"name\": \"Don Warden II\",\r\n  \"jobTitle\": \"Director of Incident Response\",\r\n  \"worksFor\": {\r\n    \"@type\": \"Organization\",\r\n    \"name\": \"Cybolt\"\r\n  },\r\n  \"gender\": \"Male\",\r\n  \"knowsAbout\": [\r\n    \"digital forensics\",\r\n    \"cyber threat intelligence\",\r\n    \"incident response\"\r\n  ],\r\n  \"knowsLanguage\": [\r\n    \"English\"\r\n  ],\r\n  \"image\": \"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2025\/01\/Don_Warden-II.jpeg.webp\",\r\n  \"url\": \"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/next-gen-ai-enabled-vapt\/\"\r\n}\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Kerberos is at the core of access management in most Windows domains, and tickets serve as the tokens that enable clients to access specific services. Kerberos ticket forging is a high-value capability for red teams, enabling them to understand authentication mechanisms in Active Directory environments. For ethical hackers, forging these tickets (Golden Ticket and Silver&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[11466],"tags":[13058],"class_list":{"0":"post-83940","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-penetration-testing","8":"tag-kerberos-golden-ticket-silver-ticket-t1558-active-directory-red-team-ctf-opsec-persistence-lateral-movement-cpent"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kerberos Offensive Playbook: Enumeration &amp; Ticket Abuse<\/title>\n<meta name=\"description\" content=\"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kerberos Offensive Playbook: Enumeration &amp; Ticket Abuse\" \/>\n<meta property=\"og:description\" content=\"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-05T02:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T12:02:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Kerberos Offensive Playbook: Enumeration &amp; Ticket Abuse\" \/>\n<meta name=\"twitter:description\" content=\"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Kerberos Offensive Playbook: Enumeration, Targeting, and Ticket Abuse\",\"datePublished\":\"2026-02-05T02:14:00+00:00\",\"dateModified\":\"2026-03-11T12:02:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/\"},\"wordCount\":1807,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Kerberos-Offensive-Playbook-featured-image.png\",\"keywords\":[\"Kerberos; Golden Ticket; Silver Ticket; T1558; Active Directory; Red Team; CTF; OPSEC; Persistence; Lateral Movement; CPENT\"],\"articleSection\":[\"Penetration Testing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/\",\"name\":\"Kerberos Offensive Playbook: Enumeration & Ticket Abuse\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Kerberos-Offensive-Playbook-featured-image.png\",\"datePublished\":\"2026-02-05T02:14:00+00:00\",\"dateModified\":\"2026-03-11T12:02:49+00:00\",\"description\":\"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\\\/Silver Ticket). Master Active Directory penetration testing\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Kerberos-Offensive-Playbook-featured-image.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Kerberos-Offensive-Playbook-featured-image.png\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/kerberos-offensive-playbook-enumeration-ticket-abuse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Penetration Testing\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/penetration-testing\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Kerberos Offensive Playbook: Enumeration, Targeting, and Ticket Abuse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kerberos Offensive Playbook: Enumeration & Ticket Abuse","description":"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/","og_locale":"en_US","og_type":"article","og_title":"Kerberos Offensive Playbook: Enumeration & Ticket Abuse","og_description":"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-02-05T02:14:00+00:00","article_modified_time":"2026-03-11T12:02:49+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Kerberos Offensive Playbook: Enumeration & Ticket Abuse","twitter_description":"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook.png","twitter_misc":{"Written by":"EC-Council","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Kerberos Offensive Playbook: Enumeration, Targeting, and Ticket Abuse","datePublished":"2026-02-05T02:14:00+00:00","dateModified":"2026-03-11T12:02:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/"},"wordCount":1807,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook-featured-image.png","keywords":["Kerberos; Golden Ticket; Silver Ticket; T1558; Active Directory; Red Team; CTF; OPSEC; Persistence; Lateral Movement; CPENT"],"articleSection":["Penetration Testing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/","name":"Kerberos Offensive Playbook: Enumeration & Ticket Abuse","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook-featured-image.png","datePublished":"2026-02-05T02:14:00+00:00","dateModified":"2026-03-11T12:02:49+00:00","description":"The essential Kerberos Offensive Playbook focusing on enumeration tactics and ticket abuse exploits (Golden\/Silver Ticket). Master Active Directory penetration testing","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook-featured-image.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/12\/Kerberos-Offensive-Playbook-featured-image.png","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/kerberos-offensive-playbook-enumeration-ticket-abuse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Penetration Testing","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/penetration-testing\/"},{"@type":"ListItem","position":4,"name":"Kerberos Offensive Playbook: Enumeration, Targeting, and Ticket Abuse"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83940"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83940\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83942"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}