DACL Abuse

The constrained delegation is explained nicely in this post. We can further confirm the delegation.
The userAccountControl: 16843264 means TRUSTED_FOR_DELEGATION is enabled. Which is important for the attack to work.
From Windows



From Linux
Editing krb5.conf
Requesting ticket for blake:
Requesting TGS with blake to impersonate Administrator
This will create a ccache file. To use it:
DCSync
Now we can dump the hashes from DC
We get a new pair of credentials for user Matt - matt:L1f30f4Spr1ngCh1ck3n!
I tried cracking the others in DC-Dump.ntds file but we only get back riley and web_svc user's passwords which we already cracked before.
Matt cannot winrm into other hosts including DC.
Previously we saw the user matt was in the linux host. Matt can ssh into mail and he is the root.
Username File
Hashes File
Credential Stuffing
Administrator can log in to any of the hosts using PtH.
Last updated