Example 7.3.3. Golden Ticket.
A dangerous attack against Kerberos authentication exists and goes by the name Golden Ticket. TGTs are the cornerstone of Kerberos security and the Golden Ticket exploit targets them specifically.
Using the fully qualified domain name, security identifier, username of an account, and a KRBTGT password hash an attacker can create their own TGTs that will grant access to services. The KRBTGT account is an account that Windows machines use to perform Kerberos administrative tasks. The KRBTGT password hash can be obtained from any machine where that account was used if the attacker has complete access to the files on the hard drive. This may be done with physical access or through the use of malware on a victim machine.
An attacker will only be able to forge TGTs until the KRBTGT account password is changed, so a common remediation strategy is to change the password. Ultimately the administrator will need to determine how the KRBTGT password hash was obtained in the first place.
5
blog.quest.com/what-is-krbtgt-and-why-should-you-change-the-password/