Resource Based Constrained Delegation
Last updated
Last updated
In a nutshell, through a Resource Based Constrained Delegation attack we can add a computer under our control to the domain.
The attack relies on three prerequisites:
We need a shell or code execution as a domain user that belongs to the Authenticated Users group. By default any member of this group can add up to 10 computers to the domain.
The ms-ds-machineaccountquota attribute needs to be higher than 0. This attribute controls the amount of computers that authenticated domain users can add to the domain.
A user or a group is a member of, needs to have WRITE privileges ( GenericAll , WriteDACL) over a domain joined computer (in this case the Domain Controller)
Creating a fake computer
Modifying delegation rights
Getting Impersonated Service Ticket
Injecting Ticket into memory
Running PSEXEC command.
Download the tool.
Implemented the script found here in the repo which adds the related security descriptor of the newly created EVILCOMPUTER to the msDS-AllowedToActOnBehalfOfOtherIdentity
property of the target computer.