https://www.youtube.com/watch?v=_nJ-b1UFDVM https://stealthbits.com/blog/impersonating-service-accounts-with-silver-tickets/#es_form_f0-n1 https://www.thehacker.recipes/ad/movement/kerberos/forged-tickets#golden-ticket https://adsecurity.org/?page_id=183 Kerberos silver ticket: silver ticket is forged granting service ticket. after creating this ticket, AS REQ, AS REP, TGS REQ and TGS REP steps are bypassed. since a silver ticket is forged TGS so there is no need to communicate with a domain controller. 1. ticket is valid as it is encrypted by service account's ntlm password hash. service account configured with service principal name for each server the kerberos authenticating service runs on. for example, sql server running on windows server 2016. by default sql service is running as follows which is not vulnerable . SQL Server (MSSQLSERVER) NT Service\MSSQLSERVER if you want to make this vulnerable or want a AD user account should authenticate sql service via kerberos then