diff --git a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md index a60046bfb0..f66138c7aa 100644 --- a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md +++ b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md @@ -58,7 +58,7 @@ The **LSASS** process will send to the TPM the **KDF context**, and the TPM will The **KDF context is** a nonce from AzureAD and the PRT creating a **JWT** mixed with a **context** (random bytes). -Therefore, even if the PTR cannot be extracted because it's located inside the TPM, it's possible to abuseLSASS to **request derived keys from new contexts and use the generated keys to sign Cookies**. +Therefore, even if the PRT cannot be extracted because it's located inside the TPM, it's possible to abuseLSASS to **request derived keys from new contexts and use the generated keys to sign Cookies**.
@@ -126,7 +126,7 @@ Connect-AzureAD --AadAccessToken --AccountId ### Attack - Using roadrecon -### Attack - Using AADInternals an leaked PTR +### Attack - Using AADInternals and a leaked PRT `Get-AADIntUserPRTToken` **gets user’s PRT token** from the Azure AD joined or Hybrid joined computer. Uses `BrowserCore.exe` to get the PRT token. @@ -269,7 +269,7 @@ HttpOnly: Set to True (checked) The rest should be the defaults. Make sure you can refresh the page and the cookie doesn’t disappear, if it does, you may have made a mistake and have to go through the process again. If it doesn’t, you should be good. {% endhint %} -#### Option 2 - roadrecon using PTR +#### Option 2 - roadrecon using PRT * Renew the PRT first, which will save it in `roadtx.prt`: