conducting-pass-the-ticket-attack
by mukul975conducting-pass-the-ticket-attack is a Security Audit and red-team skill for planning and documenting Pass-the-Ticket workflows. It helps you review Kerberos tickets, map detection signals, and produce a structured validation or report flow using the conducting-pass-the-ticket-attack skill.
This skill scores 74/100, which means it is listable and useful for directory users who want a PtT-focused workflow rather than a generic prompt. The repository gives enough operational content—frontmatter, workflows, references, and automation scripts—to help an agent recognize the task and proceed with less guesswork, but it still needs tighter install/entry-point guidance before it feels fully turnkey.
- Concrete PtT workflows are provided, including Mimikatz, Rubeus, and Impacket-based steps in references/workflows.md.
- Support files add execution leverage: scripts for detection/automation plus reference tables for event IDs and ATT&CK mapping.
- Frontmatter is valid and well-scoped to cybersecurity/red-teaming with relevant tags and a clear legal notice.
- No install command in SKILL.md, so agents may need to infer how to set up dependencies and invoke the skill.
- The repository mixes attack execution and detection/reporting content, which may make the intended use less immediately obvious to directory users.
Overview of conducting-pass-the-ticket-attack skill
What conducting-pass-the-ticket-attack does
The conducting-pass-the-ticket-attack skill helps you plan and document a Pass-the-Ticket (PtT) workflow for authorized security work. It focuses on the practical chain: identify Kerberos tickets, understand how they are reused, and turn that into a reproducible assessment or validation plan. This is not a generic Kerberos explainer; it is centered on the conducting-pass-the-ticket-attack skill for Security Audit and red-team style engagements.
Who should use it
Use this skill if you need a fast, structured way to prepare a PtT test, validate detection coverage, or write up findings after a controlled exercise. It is best for security engineers, red teamers, and incident responders who already know they are working in a permitted environment and want less guesswork than a freeform prompt.
What makes it useful
The repository is more than a summary page: it includes workflow references, standards mapping, a report template, and helper scripts. That makes the conducting-pass-the-ticket-attack guide more actionable than a plain text checklist, especially when you need to move from concept to evidence, commands, and reporting in one pass.
How to Use conducting-pass-the-ticket-attack skill
Install and open the right files
Use the conducting-pass-the-ticket-attack install flow from your skill manager, then start with SKILL.md. After that, read references/workflows.md for task flow, references/standards.md for ATT&CK and control mapping, references/api-reference.md for event IDs and tooling notes, and assets/template.md for report structure. Check scripts/process.py and scripts/agent.py if you want automation or detection logic.
Turn a rough goal into a usable prompt
The conducting-pass-the-ticket-attack usage works best when you specify scope, environment, and output type. A weak prompt is: “help me do pass-the-ticket.” A stronger prompt is: “Build a PtT assessment plan for a Windows domain lab, including ticket extraction workflow, validation steps, detection points, and a brief report outline.” Add the tool family you expect to use, the target OS, and whether you want offensive validation, detection engineering, or reporting.
What input the skill needs
Give it the minimum facts that change the workflow: domain context, whether you are testing a workstation or server, whether you need Mimikatz, Rubeus, or Impacket-oriented steps, and what success looks like. If you want the output to be useful, ask for concrete deliverables such as command sequence, verification checks, logging signals, and a short remediation summary. That is how the conducting-pass-the-ticket-attack skill produces higher-signal output than a generic prompt.
Practical workflow to follow
First ask for the plan, then ask for the exact commands or analyst checklist, then ask for a report draft. This staged approach helps because PtT work often changes based on privilege level, ticket type, and target access path. If the first result is too broad, narrow it to one workflow, one target class, and one output format.
conducting-pass-the-ticket-attack skill FAQ
Is this only for offensive testing?
No. The conducting-pass-the-ticket-attack skill is also useful for detection review, purple-team validation, and post-incident analysis. If you are only trying to understand whether Kerberos tickets are being abused, you can use the same structure without running an attack path end to end.
How is it different from a normal prompt?
A normal prompt usually returns a high-level explanation. This skill gives you repository-backed structure: workflows, standards, a report template, and scripts that reduce interpretation work. That matters when you need consistent conducting-pass-the-ticket-attack usage across multiple assessments.
Is it beginner-friendly?
It is beginner-friendly only if you already know the work is authorized and you want guided structure. It is not the right starting point for learning Kerberos from zero. Beginners should use it as a guided assessment template, not as a substitute for foundational Windows authentication knowledge.
When should I not use it?
Do not use conducting-pass-the-ticket-attack if your goal is broad Windows enumeration, generic malware analysis, or non-Kerberos lateral movement. It is also a poor fit if you cannot provide environment details or if you need a purely defensive detection rule set without workflow context.
How to Improve conducting-pass-the-ticket-attack skill
Give stronger scope and constraints
The best results come from clear boundaries: domain name, host type, whether admin rights are assumed, and whether you need lab-safe validation or production-safe observation. For example, “produce a PtT validation plan for a Windows test domain with no payload execution, only detection verification and report notes” is far better than “make it realistic.”
Ask for the output you will actually use
If you need an assessment deliverable, say so. Request a command checklist, triage notes, ATT&CK mapping, or a one-page executive summary. The assets/template.md file is especially useful when you want the skill to generate a report that matches the repository’s format instead of an ad hoc narrative.
Iterate on the first draft
Common failure modes are too much tool-sprawl, unclear target assumptions, and missing verification steps. If the first answer is broad, refine it by asking for one workflow only, or for a version that separates extraction, injection, access validation, and evidence capture. That makes the conducting-pass-the-ticket-attack guide more accurate and easier to execute.
Use repo references to sharpen results
If you want better conducting-pass-the-ticket-attack install and usage outcomes, anchor your prompt to the repo’s references: ask for guidance tied to 4768, 4769, ticket encryption type, and ATT&CK T1550.003. The more you specify the evidence you want to collect, the better the skill can distinguish between offensive actions, detection signals, and reporting artifacts.
