🕵️Delegate

Enumeration
IP
10.10.82.125
We have a Windows machine with domain delegate.vl
and hostname DC01.delegate.vl
LDAP anonymous bind is disabled but as a guest we have read access tho the NETLOGON
share We download a users.bat
file

We get a password for the user a.briggs

Now we can enumerate the domain with bloodhound

We can see that the compromised user has GenericWrite
to n.thompson
, so we can add a SPN to the user, kerberoast and then remove it


And we got the password

Unconstrained Delegation
This user is in the delegation admins group. we can add a new machine account to the domain and abuse Unconstrained Delegation to get a kerberos ticket for the DC machine accountDC$


We use Powermad to create a new machine account and add a SPN


Then we modify the DNS records to make the DC connect to us

To use krbrelayx.py
we need the NTLM hash of the new machine account and after making the DC connect to us using printerbug.py
we get a ticket for the DC$
account




Last updated
Was this helpful?