Unconstrained Delegation
Abuse from Windows System
First we have to compromised Web Server or Unconstrained Delegation System.

Verify Print Spooler
Monitor
Launch Rubeus from an administrative command prompt
Printer Bug
Pass The Ticket
With Domain Controller ticket, we can used it for DCSync Attack, and craft golden ticket.
Abuse from Linux System
FindDelegation
Addspn
We have to compromised password hash of Unconstrained Delegation Machine
Verify on computer properties
The ββadditionalβ flag will modified service principal name of the machine account via the βmsDS-AdditionalDnsHostNameβ attribute to include the βHOST/evil.vulnableone.localβ service principal name.
dnstool
Utilizing the βdnstoolβ Add a DNS record pointing to the attacker's host:
Check that the record was added successfully
krbrelayx
Start krbrelayx.py providing AES key of the owned computer account that was dumped earlier in order to be used for Kerberos authentication. Two listeners will be created by default SMB and HTTP.
printerbug
Export Ticket:
Impacket-Secretsdump
Impacket-Psexec
Cleanup
Remove SPN
Remove DNS Record
Last updated