Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 791

Pass-the-Ticket

What is Pass-the-Ticket?

Pass-the-TicketAn Active Directory attack that reuses a stolen Kerberos ticket to impersonate a user or service without ever knowing the underlying password.


Pass-the-Ticket (PtT) abuses Kerberos by injecting a previously stolen TGT or service ticket into the current logon session and using it to access resources as the original principal. Attackers harvest tickets from LSASS memory or from kirbi files on compromised hosts, typically with Mimikatz or Rubeus, then inject them on another machine to authenticate to SMB shares, MSSQL, or DCs. MITRE ATT&CK tracks the technique as T1550.003 (Use Alternate Authentication Material: Pass the Ticket). Defences include enabling Credential Guard, enforcing short ticket lifetimes, protecting privileged accounts with the Protected Users group, monitoring Kerberos events, and detecting Mimikatz-style memory access.

Examples

  1. 01

    Stealing a domain admin's TGT from a workstation and reusing it to connect to a domain controller.

  2. 02

    Exporting tickets with Rubeus and injecting them on an attacker-controlled host to query AD.

Frequently asked questions

What is Pass-the-Ticket?

An Active Directory attack that reuses a stolen Kerberos ticket to impersonate a user or service without ever knowing the underlying password. It belongs to the Attacks & Threats category of cybersecurity.

What does Pass-the-Ticket mean?

An Active Directory attack that reuses a stolen Kerberos ticket to impersonate a user or service without ever knowing the underlying password.

How does Pass-the-Ticket work?

Pass-the-Ticket (PtT) abuses Kerberos by injecting a previously stolen TGT or service ticket into the current logon session and using it to access resources as the original principal. Attackers harvest tickets from LSASS memory or from kirbi files on compromised hosts, typically with Mimikatz or Rubeus, then inject them on another machine to authenticate to SMB shares, MSSQL, or DCs. MITRE ATT&CK tracks the technique as T1550.003 (Use Alternate Authentication Material: Pass the Ticket). Defences include enabling Credential Guard, enforcing short ticket lifetimes, protecting privileged accounts with the Protected Users group, monitoring Kerberos events, and detecting Mimikatz-style memory access.

How do you defend against Pass-the-Ticket?

Defences for Pass-the-Ticket typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Pass-the-Ticket?

Common alternative names include: PtT.

Related terms