Having compromised a domain controller during testing, I now want to create persistent domain administrator access. In addition, operational security is important to me because I do not want to connect to netowkr hosts with the help of domain administrator credentials.
Having generated a Kerberos gold ticket, I can get a system
cmd shell on the domain joins hosts on the network with Impacket
psexec.py, without having to use the administrator identification information.
However, I would like to use the tools available in meterpreter with this access.
Is it possible to use this Kerberos ticket generated with metasploit?