Resourced Contrained Delegation

https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/resource-based-constrained-delegation-ad-computer-object-take-over-and-privilged-code-executionarrow-up-right

So the steps here are:

  • create a new computer object

  • change msDS-AllowedToActOnBehalfOfOtherIdentity attribute so the created computer can impersonate of authenticate as any user to the attacking object in this example DC

  • requesting ticket for newly created computer as Administrator

  • access C$ share -> psexec as administrator

To make this in Windows shell PowerView and Powermad script are necessary

#check ms-ds-machineaccountquota, if user can add new computer to the domain
Get-DomainObject -Identity "dc=resourced,dc=local" -Domain resourced.local | Select-Object -Property ms-ds-machineaccountquota

#check DC version at least 2012
Get-DomainController | Select-Object -Property OSVersion

#check if attribute is not already set
Get-NetComputer RESOURCEDC | Select-Object -Property name, msds-allowedtoactonbehalfofotheridentity

Adding New Computer object

Modifying Target Computer's AD Object

Last updated