Skip to content

Sylpbbraz/search_rbcd

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

68 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Topics: rbcd, active-directory, rbcd-delegation-auditor, resource-based-attack-surface, active-directory-triage-tool, kerberos-delegation-inspector, privilege-escalation-discovery-logic, rbcd-vulnerability-scanner-pro, ad-constrained-delegation-logic, directory-services-security-audit, automated-ad-path-finder

Foreword

The primary method for executing RBCD attacks currently involves searching for mS-DS-CreatorSID. If the machine creator is under our control, we can modify the corresponding machine's msDS-AllowedToActOnBehalfOfOtherIdentity setting using the tool [SharpAllowedToAct-Modify].

Then let's go ahead and try searching all computers to check their msDS-AllowedToActOnBehalfOfOtherIdentity attribute. If any values point to machines or accounts we control, we can simply use RBCD to take them over.

Usage

python3 search_rbcd.py -u ldapusername -p 'ldappassword' -d domain.com -l ldapserver.domain

image-20220115233019823

About

focused tool to search and audit msDS-AllowedToActOnBehalfOfOtherIdentity attributes in Active Directory — detecting RBCD misconfigurations, Kerberos delegation risks, and privilege escalation paths.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages