Resource-based Constrained Delegation
Overview
We have code execution on the computer
(COM01)
as the current user.User creates a new computer object
(FAKE01)
.User leverages the WRITE privilege on the
(COM01)
computer object and updates its object's attribute msDS-AllowedToActOnBehalfOfOtherIdentity to enable the newly created computer(FAKE01)
to impersonate and authenticate any domain user that can then access the target system(COM01)
.(COM01)
trusts(FAKE01)
due to the modified msDS-AllowedToActOnBehalfOfOtherIdentity.We request Kerberos tickets for
(FAKE01)
$ with ability to impersonate an admin user.
Tools needed
Exploitation
Assumption is that the attacker has access to the system through winrm
Local
Remote
References
Last updated