Unconstrained Delegation

Abuse from Windows System

First we have to compromised Web Server or Unconstrained Delegation System.

Verify Print Spooler

Monitor

Launch Rubeus from an administrative command prompt

Printer Bug

Pass The Ticket

With Domain Controller ticket, we can used it for DCSync Attack, and craft golden ticket.

Abuse from Linux System

FindDelegation

Addspn

We have to compromised password hash of Unconstrained Delegation Machine

Verify on computer properties

The β€œβ€“additional” flag will modified service principal name of the machine account via the β€œmsDS-AdditionalDnsHostName” attribute to include the β€œHOST/evil.vulnableone.local” service principal name.

dnstool

Utilizing the β€œdnstool” Add a DNS record pointing to the attacker's host:

Check that the record was added successfully

krbrelayx

Start krbrelayx.py providing AES key of the owned computer account that was dumped earlier in order to be used for Kerberos authentication. Two listeners will be created by default SMB and HTTP.

printerbug

Export Ticket:

Impacket-Secretsdump

Impacket-Psexec

Cleanup

Remove SPN

Remove DNS Record

Last updated