Domain Compromise via DC Print Server and Kerberos Delegation
最后更新于
这有帮助吗?
最后更新于
这有帮助吗?
This lab demonstrates an attack on Active Directory Domain Controller (or any other host to be fair) that involves the following steps and environmental conditions:
If the spoolss was not running, we would receive an error.
Now, after compiling the amazing PoC by , we execute it with two arguments target
and server
(DC with spoolss running on it):
We are shown a message that the target attemped authenticating to our compromised system, so let's check if we can retrieve DC01 TGT:
With this, we can make our compromised system ws01$
appear like a Domain Controller and extract an NTLM hash for the user offense\spotless
which we know has high privileges in the domain:
The above clearly shows the attack was successful and an NTLM hash for the user spotless got retrieved - get cracking or passing it now.