Obj 15 Unconstrained Delegation
Task - Find a server in the dcorp domain where Unconstrained Delegation is enabled. Compromise the server and escalate to Domain Admin privileges. Escalate to Enterprise Admins privileges.
We first need to find a server that has unconstrained delegation enabled
Find server with Unconstrained Delegation Enabled
Try one of the servers to see if we have local admin privileges
In the new process run the following commands to see if we have local admin access
We have local admin access on appsrv so we can copy Rubeus over
We are going to run Rubeus in listener mode on appsrv
From student/host vm let's use MS-RPRN to force Authentication from dcorp-dc
We should start seeing some out put on our Rubeus listener now
Copy the base64 encoded ticket and use it with Rubeus on student VM. Run the below command from an elevated shell as the SafetyKatz command that we will use for DCSync needs to be run from an elevated process
Now we can run a DCSync attack from the new process
- Part 2 Elevate to Enterprise Admins -
Let's start a session on appsrv and setup a Rubeus listener
Lets' run MS-RPRN on our host vm to trigger a response from mcorp-dc to dcorp-appsrv
We should get a response on our Rubeus listener
Run Rubeus to create a new process
Now we can run the DCSync attack from the new process
We are now Enterprise Admins!
- Part 3 Check the server if there is an existing DA ticket
Let's start a new invishell on our host vm
Now let's get Mimikatz on the session and then go back into the session
Create a userX directory where X is your userId to avoid overwriting tickets of other users
Now let's invoke Mimikatz to dump the tickets
Now we can grep through the tickets to see which one we want to use.
Once we find a ticket to reuse we can inject it into lsass to get DA privs
Now we can check to see if it worked
Last updated