Resource Based Constrained Delegation
Last updated
Last updated
In a nutshell, through a Resource Based Constrained Delegation attack we can add a computer under our control to the domain.
The attack relies on three prerequisites:
We need a shell or code execution as a domain user that belongs to the Authenticated Users group. By default any member of this group can add up to 10 computers to the domain.
The ms-ds-machineaccountquota attribute needs to be higher than 0. This attribute controls the amount of computers that authenticated domain users can add to the domain.
A user or a group is a member of, needs to have WRITE privileges ( GenericAll , WriteDACL) over a domain joined computer (in this case the Domain Controller)
Download the tool. https://github.com/tothi/rbcd-attack/blob/master/rbcd.py
Creating a fake computer
Modifying delegation rights
Implemented the script rbcd.py found here in the repo which adds the related security descriptor of the newly created EVILCOMPUTER to the msDS-AllowedToActOnBehalfOfOtherIdentity
property of the target computer.
Getting Impersonated Service Ticket
Injecting Ticket into memory
Running PSEXEC command.