Delegate
Last updated
Was this helpful?
Last updated
Was this helpful?
IP
We have a Windows machine with domain delegate.vl
and hostname DC01.delegate.vl
LDAP anonymous bind is disabled but as a guest we have read access tho the NETLOGON
share We download a users.bat
file
We get a password for the user a.briggs
Now we can enumerate the domain with bloodhound
We can see that the compromised user has GenericWrite
to n.thompson
, so we can add a SPN to the user, kerberoast and then remove it
And we got the password
This user is in the delegation admins group. we can add a new machine account to the domain and abuse Unconstrained Delegation to get a kerberos ticket for the DC machine accountDC$
Then we modify the DNS records to make the DC connect to us
To use krbrelayx.py
we need the NTLM hash of the new machine account and after making the DC connect to us using printerbug.py
we get a ticket for the DC$
account
We use to create a new machine account and add a SPN