Topics: rbcd, active-directory, rbcd-delegation-auditor, resource-based-attack-surface, active-directory-triage-tool, kerberos-delegation-inspector, privilege-escalation-discovery-logic, rbcd-vulnerability-scanner-pro, ad-constrained-delegation-logic, directory-services-security-audit, automated-ad-path-finder
The primary method for executing RBCD attacks currently involves searching for mS-DS-CreatorSID. If the machine creator is under our control, we can modify the corresponding machine's msDS-AllowedToActOnBehalfOfOtherIdentity setting using the tool [SharpAllowedToAct-Modify].
Then let's go ahead and try searching all computers to check their msDS-AllowedToActOnBehalfOfOtherIdentity attribute. If any values point to machines or accounts we control, we can simply use RBCD to take them over.
python3 search_rbcd.py -u ldapusername -p 'ldappassword' -d domain.com -l ldapserver.domain