Shadow Credentials
ABOUT
Shadow Credentials is a stealthy post-exploitation persistence technique (disclosed by Elad Shamir) that leverages the msDS-KeyCredentialLink
attribute on AD objects. This attribute is used by Windows Hello for Business and Azure AD Join. When you add a custom public key to it, you can authenticate via Kerberos PKINIT using your matching private key — effectively becoming the user.
This gives you a TGT without touching the user's password or traditional login flow.
Requirements
Write access (
GenericWrite
/GenericAll
) to target user/computer objectPKINIT enabled (default in modern AD environments)
Domain reachable over Kerberos (TCP/UDP 88)
Flow
Generate RSA key pair
Create
KeyCredential
object with public keyInject the object into
msDS-KeyCredentialLink
of the target accountAuthenticate using private key via Kerberos PKINIT
Get TGT for the target account
LINUX
Check KeyCredential Attribute Present
Automatic Shadow Credentials Execution
Performs:
KeyCredential injection
PKINIT auth
TGT extraction
NT hash dump
Cleanup
RESOURCES
Last updated