Add Signatory Golden Ticket with airSlate SignNow

Eliminate paper and automate document management for more performance and countless opportunities. eSign any papers from a comfort of your home, fast and accomplished. Explore the best manner of doing business with airSlate SignNow.

Award-winning eSignature solution

Send my document for signature

Get your document eSigned by multiple recipients.
Send my document for signature

Sign my own document

Add your eSignature
to a document in a few clicks.
Sign my own document

Improve your document workflow with airSlate SignNow

Versatile eSignature workflows

airSlate SignNow is a scalable solution that grows with your teams and company. Build and customize eSignature workflows that fit all your company needs.

Instant visibility into document status

View and download a document’s history to monitor all modifications made to it. Get immediate notifications to understand who made what edits and when.

Easy and fast integration set up

airSlate SignNow effortlessly fits into your existing business environment, allowing you to hit the ground running instantly. Use airSlate SignNow’s powerful eSignature capabilities with hundreds of popular applications.

Add signatory golden ticket on any device

Spare the bottlenecks associated with waiting for eSignatures. With airSlate SignNow, you can eSign documents in minutes using a computer, tablet, or mobile phone

Comprehensive Audit Trail

For your legal protection and general auditing purposes, airSlate SignNow includes a log of all adjustments made to your records, offering timestamps, emails, and IP addresses.

Rigorous security requirements

Our top priorities are securing your records and important information, and guaranteeing eSignature authentication and system protection. Stay compliant with industry standards and polices with airSlate SignNow.

See airSlate SignNow eSignatures in action

Create secure and intuitive eSignature workflows on any device, track the status of documents right in your account, build online fillable forms – all within a single solution.

Try airSlate SignNow with a sample document

Complete a sample document online. Experience airSlate SignNow's intuitive interface and easy-to-use tools
in action. Open a sample document to add a signature, date, text, upload attachments, and test other useful functionality.

sample
Checkboxes and radio buttons
sample
Request an attachment
sample
Set up data validation

airSlate SignNow solutions for better efficiency

Keep contracts protected
Enhance your document security and keep contracts safe from unauthorized access with dual-factor authentication options. Ask your recipients to prove their identity before opening a contract to add signatory golden ticket.
Stay mobile while eSigning
Install the airSlate SignNow app on your iOS or Android device and close deals from anywhere, 24/7. Work with forms and contracts even offline and add signatory golden ticket later when your internet connection is restored.
Integrate eSignatures into your business apps
Incorporate airSlate SignNow into your business applications to quickly add signatory golden ticket without switching between windows and tabs. Benefit from airSlate SignNow integrations to save time and effort while eSigning forms in just a few clicks.
Generate fillable forms with smart fields
Update any document with fillable fields, make them required or optional, or add conditions for them to appear. Make sure signers complete your form correctly by assigning roles to fields.
Close deals and get paid promptly
Collect documents from clients and partners in minutes instead of weeks. Ask your signers to add signatory golden ticket and include a charge request field to your sample to automatically collect payments during the contract signing.
Collect signatures
24x
faster
Reduce costs by
$30
per document
Save up to
40h
per employee / month

Our user reviews speak for themselves

illustrations persone
Kodi-Marie Evans
Director of NetSuite Operations at Xerox
airSlate SignNow provides us with the flexibility needed to get the right signatures on the right documents, in the right formats, based on our integration with NetSuite.
illustrations reviews slider
illustrations persone
Samantha Jo
Enterprise Client Partner at Yelp
airSlate SignNow has made life easier for me. It has been huge to have the ability to sign contracts on-the-go! It is now less stressful to get things done efficiently and promptly.
illustrations reviews slider
illustrations persone
Megan Bond
Digital marketing management at Electrolux
This software has added to our business value. I have got rid of the repetitive tasks. I am capable of creating the mobile native web forms. Now I can easily make payment contracts through a fair channel and their management is very easy.
illustrations reviews slider
walmart logo
exonMobil logo
apple logo
comcast logo
facebook logo
FedEx logo
be ready to get more

Why choose airSlate SignNow

  • Free 7-day trial. Choose the plan you need and try it risk-free.
  • Honest pricing for full-featured plans. airSlate SignNow offers subscription plans with no overages or hidden fees at renewal.
  • Enterprise-grade security. airSlate SignNow helps you comply with global security standards.
illustrations signature

Your step-by-step guide — add signatory golden ticket

Access helpful tips and quick steps covering a variety of airSlate SignNow’s most popular features.

Using airSlate SignNow’s eSignature any business can speed up signature workflows and eSign in real-time, delivering a better experience to customers and employees. add signatory Golden Ticket in a few simple steps. Our mobile-first apps make working on the go possible, even while offline! Sign documents from anywhere in the world and close deals faster.

Follow the step-by-step guide to add signatory Golden Ticket:

  1. Log in to your airSlate SignNow account.
  2. Locate your document in your folders or upload a new one.
  3. Open the document and make edits using the Tools menu.
  4. Drag & drop fillable fields, add text and sign it.
  5. Add multiple signers using their emails and set the signing order.
  6. Specify which recipients will get an executed copy.
  7. Use Advanced Options to limit access to the record and set an expiration date.
  8. Click Save and Close when completed.

In addition, there are more advanced features available to add signatory Golden Ticket. Add users to your shared workspace, view teams, and track collaboration. Millions of users across the US and Europe agree that a system that brings everything together in one holistic workspace, is exactly what companies need to keep workflows working efficiently. The airSlate SignNow REST API enables you to integrate eSignatures into your application, internet site, CRM or cloud storage. Check out airSlate SignNow and enjoy faster, smoother and overall more productive eSignature workflows!

How it works

Open & edit your documents online
Create legally-binding eSignatures
Store and share documents securely

airSlate SignNow features that users love

Speed up your paper-based processes with an easy-to-use eSignature solution.

Edit PDFs
online
Generate templates of your most used documents for signing and completion.
Create a signing link
Share a document via a link without the need to add recipient emails.
Assign roles to signers
Organize complex signing workflows by adding multiple signers and assigning roles.
Create a document template
Create teams to collaborate on documents and templates in real time.
Add Signature fields
Get accurate signatures exactly where you need them using signature fields.
Archive documents in bulk
Save time by archiving multiple documents at once.
be ready to get more

Get legally-binding signatures now!

FAQs

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact support

What active users are saying — add signatory golden ticket

Get access to airSlate SignNow’s reviews, our customers’ advice, and their stories. Hear from real users and what they say about features for generating and signing docs.

Excellent resource for our business needs
5
Administrator in Health, Wellness and Fitness

What do you like best?

What I love about airSlate SignNow is that it is extremely easy to use. I simply save documents as a pdf and them upload them. I can customize documents. I also love that we can CC people on the email and get notifications. I love that we can resend the document. I also love that it notifies people that the document needs to be signed.

Read full review
Easy to use
5
Nikki J

What do you like best?

I love that my clients can sign with their actual signature if they choose to. I also love that it can be done in blue or black ink. I love using my iPad Pro and Apple Pencil for signatures. Because the Real Estate Industry is almost exclusively using electronic signatures and documents a eSignature application is a necessity and airSlate SignNow is my personal favorite.

Read full review
Easy way to sign!
5
User in Consumer Services

What do you like best?

I like how easy it is to navigate to each box and type in the information. Easier than Docusign.

Read full review

Related searches to add signatory Golden Ticket with airSlate airSlate SignNow

airSlate SignNow
e signature
edocument signature
wonka golden ticket template word document
airSlate SignNow
signnow pricing
send docs for signature
video background

Sign golden ticket

okay in this video we're going to take a look at the Kerberos golden ticket attack now this is not so much a privilege escalation attack where we are going to kind of use it in that way in this video there's more of a persistence attack so it's like when you've already got access to some pretty high-level stuff in the domain and as you'll see in the demo we do actually have the option of just using the administrator account instead so this is when you've pretty much already compromised the domain this is gonna be a way to keep persistent access to that domain because if they change the administrator account password that's not gonna make any difference for this kind of attack so this machine that we're on here is just a separate standalone machine not part of the domain not got any kind of authorization on the domain on the network this machine we've got over here is a domain controller for our target domain this scr m dot local domain is when we're trying to attack and now the key part of this attack is this account here which is a built-in account that exists on every Active Directory domain and it's called krbtgt KR b stands for Kerberos TGT is ticket granting ticket but you can't really need to understand that side of things too much all you need to understand really for this attack is the the password hash for this account even though it's disabled this account gets used its password which is generated automatically by the system that gets used to encrypt data that is sent by Kerberos and this is kind of like the top-level secret password that encrypts everything to prove that it is a legitimate completely authorized Kerberos ticket so if we can get the ntlm password hash for this we can then use that with tools like mini katz to create what's called a golden ticket which will allow us to impersonate anyone we want so let's take a look at that in action for this first part of just getting the ntlm hash we're going to assume you've already got a way to do that so if you want to look at one way to do that you can watch my video on DC sync attacks which is what we're going to use just in this demo so just as a quick refresher if you look at the security on the root of the domain you'll see this account we're going to use as a demo this t-star account has got this position here replicating directory changes which basically allows them to impersonate a domain controller and synchronize password hashes from all user accounts again that's covered in great detail in another video which I'll leave a link to in the description but for now we're just going to kind of do what we did in that video do secrets dumped rpy i've already set my DNS server to point to this to main controller so we can just do the main name we don't need to do the DC IP address we'll put that user name or put his password and then we'll just do the IP of the machine to type out the full name and then we'll just do just DC and TLM so this should yeah this should get us all the password hashes for every user account in the domain and at this point we could do what we did in the DC sync video where you just take this out - traitor password hash need it pass the hash attack that's the easiest way obviously if somebody figured out that you've done this they could just remove these permissions or change the administrator password and then you can no longer do that attack whereas with this attack it's much more persistent much more likely to survive for a long time so what we're gonna do here is take the krbtgt account take is nt password hash which is that bit at the end there and if we go to mini cats and we wanna run which X 64 story and we were on many cats PXE okay this little console and there's loads of features in this tool but we're just going to run the Kerberos golden attack and I can't remember all of the parameters that you want so as far as I can see there isn't a way to get any kind of help text for each command in the tool itself which is always annoying and if we just googled mini cat's Kerberos and we look at the wiki we can see which arguments is expecting so one slash domain so that's easy that is just our domain name and then we want Sid and this is the SID of the domain so if you have like a remote shell you know however how have you managed to get to this point with these credentials you've presumably got access in some ways the domain so you can easily just get the domain set by just getting the seed of any user account and then just stripping the last part off of it so just to simulate that I'm just gonna switch over to natural domain machine obviously wouldn't normally do it like this you'd have remote shell running or whatever and then but we'll just do who Li /all and that will give us a SID of the current user account and we can just strip the last part off and then we get the domain set so you said paste that in slash user so we're going to impersonate the administrator account and then slash ID is optional we don't need that such groups is optional and then we just need to specify the ntlm hash with this ki VT DT flat so would care be T DT and then paste in this hash that we got up here so this part here the N T hash paste that in and I'm also going to do such PT t because if you don't do that this will just get saved to a file this ticket that it creates and if you do slash PTT it will just associate it with our logon session so for example right now if I just run the built-in Windows tool to list Kerberos tickets K list we have 0 tickets but after running this we run that again we've now got this Co bus ticket associated with our logon session so what that means in Windows at least I don't know how it works on Linux if you have to save it as a file and then specify it with certain commands but on windows that means that if we try and access say n SMB share or anything on this remote server as long as we do it in a way that supports Kerberos authentication which I'll talk about in a second it will automatically use this Kerberos ticket that we've got here so we're going to specify anything so let's test that theory let's do not use to map a network drive and we'll say we want to go to the remote machine go to the C dollars yet obviously only administrator Kaname access to C dollar share so if we were doing this normally from an on domain machine like this it would just fail that says denied but because we've got this Kerberos ticket it completes successfully we can go into the O dry we can list everything in the C Drive we've got full admin access so that's a demonstration of the attack and now it's quick look at exactly how and why it works and also I'll just touch on what I mentioned before when I said this'll only work if you do it in a way that supports Kerberos authentication if we had tried to go to the IP address here instead of the name it wouldn't work it would fall back to ntlm authentication and the Kerberos ticket would not get used so you have to use the full machine name with some services you can just use the first part of the machine name just the machine in its own some of them though you're going to need to do a fully qualified domain name like this so it's safer to just always do the fully qualified domain name and then you can be fairly certain that it's going to be using Kerberos authentication also I've just logged off and log back on just to clear all the associated Kerberos tickets you can't in theory do Kahless to purge but it didn't seem to work it still was using the old ticket but now that we've logged off my back on we tried to run that exact same command we go to as DC 1 SC around local C dollar now we get prompted for you name whereas we didn't before just automatically used the admin ticket that we had so let's fire up Wireshark and then we can quickly see exactly what's going on here see if we run that normally we get to this point where it's just trying to log on it's just that fast be - as you can see we're doing negotiate request and then it just tries to authenticate as my current user account which is just this workstation HT BC is the name of the user account and obviously that will fail it you can't log on because that's not a domain account and it doesn't have any kind of permissions it's fire mimikatz again and interestingly this first part where we actually create the the golden ticket doesn't seem to do any kind of network communication at all you can just type any old junk in there and it will create the ticket for you it's just that if you actually tried to use that it wouldn't work so we've got our ticket created again and you'll notice that it's actually set to expire in ten years time so that's why this is kind of called a golden ticket because it lets you impersonate anyone and it lasts for years I mean you can set it to last for even longer if you want to but yeah that's why it's a golden ticket because it just lets you do absolutely everything but why exactly does it work why does getting the krbtgt account password hash mean that we can now impersonate any user on the debate and that doesn't really make a lot of sense so let's look at exactly what's going on here now if we fire up Wireshark and we'll do a network drive again to this same service and it uses the ticket that we've got and we'll run Wireshark while we do that so complete successfully and if you filter this for us and me too actually that's filtered for Kerberos be easier to kind of follow it along now you might remember in previous videos when we looked at some Kerberos stuff it starts off with an AAS request and then we get an AAS response back on AS rep and that was some of the stuff we were looking at attacking previously but here we're jumping straight to the next part of the whole Kerberos authentication dance which is this TGS request and TDS response so the first part with the a s request in response that gets you what's called the TGT ticket granting ticket and then you can use that to then request a TGS for any service that you're trying to access so an example of a service and the one that we're using in this case would be a file share it could be something else like SQL or whatever anything that supports Kerberos authentication in this case it's just an SMB share so if we look in the request we will see somewhere in here the service that we're trying to access is CIFS which is I can't remember what sounds lost on my head but is basically file-share service and then dc1 is the server that's hosting that service so again like this CIFS here instead of a file share service that this is could be anything to support Kerberos authentication as long as it matches what's setting the service principal name for the account but again that's kind of beyond the scope of this topic anyway why does all this matter why does all of this mean that when we have the anti LEM hash for the krbtgt account that we can just do whatever we want it's pretty really shortly and concisely the reason is the Kerberos tickets are encrypted with that password hash so the ntlm hash of the care bt GT account is used to encrypt part of this I believe it's this part here there are some other encrypted parts famously an encrypted part here but they get encrypted with different things so you remember from the previous videos we've done looking at Kerberos one of these parts gets encrypted with the users password hash which is why we were able to get user password hashes from the authentication request so that was in the first part the a s request an a s response they have parts of them that encrypted with the users password whereas here this will be encrypted with I believe this part he'll be encrypted with the machine account password so in this case it'll be the DC one machine account computer account in Active Directory that accounts password which is just a really long random also generated password that gets changed every 30 days that will be used to encrypt this section here but this top-level part this encrypted part here which I believe acts as kinda like a checksum for the entire ticket and there might be some other data in there I can't remember from looking at the Kerberos spec exactly what's in here but this part gets encrypted with the krbtgt account password well it's password hash which luckily for us is what we have we don't have its password and trying to find its password would be very very difficult but getting the password hash it's not quite so difficult so if we've got the password hash we can with the help of mini katz a program that understands all the format of everything that needs to be in here we can just create a ticket that says whatever we want and because we've used that password hash to encrypt this part it will here completely valid to the domain so that's kind of the short summary and I could go more into how Kerberos works in terms of tgs's and TZ T's and stuff but I think for this video let's just kind of leave it at that the reason it works is because we've got the kind of master key that is used to encrypt stuff and kind of prove that it's being authenticated by the Kerberos central database and central service KDC when we forge a ticket and we can encrypt this part with that hash it basically proves to every machine that we talk to into the KDC and everything that that is a legitimate ticket so what we can do with that is just set the username to be anything we want so here we set it to administrator you can actually literally just make up a user account I'm just literally any name you want doesn't have to be one that even exists and because it'll have the right Sid you might remember in the mimikatz documentation somewhere it said which ID we could use so this Sid here we're specifying 500 which is the built in administrator account Sid and obviously permissions are all done based on Sid not username so you can specify whatever you want with the actual username because the only thing that's going to ever get checked is this ID here which we just specify it 500 so it's always going to think we are the administrator account and it's also specifying some group SIDS here or relative IDs the end of a Sid so this will be like the domain admins group the enterprise that means group stuff like that and just to make sure you're definitely gonna have access to absolutely everything which is why again it's called a golden ticket because it just gives you everything you could ever want as an attacker obviously it's pretty hard to actually get to this point and again we could just actually use the administrators hash and do it pass the hash attack if we've got to the point where we can get the hash for the krbtgt account so it's not an easy thing to do in a normal domain but if you have found some way to get hashes for any account in the domain then you can do this and get much more persistent long-term foothold I guess you call it I should point out as well that if you were to try and do this all on the right machine which was my mistake the first time I ever tried to do this I have to say pretend this was a remote shell that we're running on the domain controller or on any server on the domain if we tried to create a golden ticket there and store it with the session when we tried to actually access anything it wouldn't work because Kerberos authentication wouldn't get used like when you're just accessing local files there's no code authentication going on there even if you tried to do like net use that we did before like that and even if you just did localhost and then the seed or it still wouldn't work it's windows is smart enough to realize that that is the same machine I'm currently running on so we don't need to do any kind of Kerberos authentication so you always need to do this part the actual creation of the golden ticket storing it with your session and accessing the server you always need to do that remotely so that Kerberos authentication actually has to get used so hope that explains it and I feel like I probably should have got a little bit more in depth with this stuff but it would take quite a while to explain how Kerberos works in general I don't wanna kind of overload you with loads of terms cuz I know a lot of this stuff TG T's and TDs and IAS requests and all that stuff does get a bit much when you're not too familiar with it and I'm still learning about it I'm not gonna pretend I'm not salute expert on this stuff I'm still figuring things out as well so I'll probably do some more research on Kerberos make sure I get a better handle of it myself and then I'll put together like a general Kerberos explanation slash tutorial I guess of how it works but yeah that will do for this video hope you found some of it interesting and I will see you in the next one

Show more

Frequently asked questions

Learn everything you need to know to use airSlate SignNow eSignatures like a pro.

See more airSlate SignNow How-Tos

How do I sign a PDF from my email?

airSlate SignNow provides powerful add-ons so that you can conveniently sign documents right from your Gmail inbox. With the help of the Gmail add-on, you can eSign attachments without leaving your inbox. Find the application in the G Suite Marketplace and add it. Once you’ve added it, log in to your airSlate SignNow account and open the message containing an attachment that you need to sign. Click on the airSlate SignNow icon in the right-hand sidebar menu and choose the attachment you want to sign. Quickly apply your eSignature in the editor and save or send the document to recipients.

How do I sign documents sent to my email?

If you already have an airSlate SignNow account, it’s very easy. There are two ways you can eSign files from your inbox. Install our extension for Google Chrome and import email attachments directly from your inbox. If you prefer a browser other than Chrome, download the attachment, open signnow.com, and upload it to the system. airSlate SignNow makes eSigning documents fast and simple.

How can I sign a PDF file in an email?

With airSlate SignNow, you can easily approve documents electronically online and even an email attachment right from your Gmail inbox without having to download it. To do so, first create an account in airSlate SignNow; then, go to the Google Workplace Marketplace, find and install the airSlate SignNow for Gmail add-on. Open an email with an attachment you need to sign. Click on the S icon in the right-side panel to launch the tool. Click Upload to import the attached document into your airSlate SignNow account for editing, place the My Signature field, and eSign your form in clicks.
be ready to get more

Get legally-binding signatures now!