Obj 13 Security Descriptors
Task - Modify security descriptors on dcorp-dc to get access using PowerShell remoting and WMI without requiring administrator access. Retrieve machine account hash from dcorp-dc with silver ticket.
Once we have administrative privileges on a machine, we can modify security descriptors of services to access the services without administrative privileges. Below command(to be run as Domain Administrator)modifies the host security descriptors for WMI on the DC to allow student access to WMI:
Start a new session, run invishell, and load race.ps1
Now, we can execute WMI queries on the DC as studentx:
Similar modification can be done to PowerShell remoting configuration. (In rare cases, you may get an I/O error while using the below command, please ignore it). Please note that this is unstable since spme patches in August 2020:
Enable PSSRemoting on the DC from the student vm
We can now run commands using PowerShell remoting on the DC without DA privileges:
Retrieve machine account hash without DA
we first need to modify permissions on the DC to allow this. Start a new session as DA and load the race.ps1 script shown above.
Add RemoteBackDoor to DC
Now we can retrieve the machine hash to use later
We can use the machine account hash to create Silver Tickets. Create Silver Tickets for HOST and RPCSS using the machine account hash to execute WMI queries:
Create a Silver Ticket as HOST on the DC
Create a Silver Ticket as RPCSS on the DC
Check to make sure the tickets were made
Now we can run WMI queries on the DC
Last updated