17 - LO1️7️

Learning Object 17

Tasks

1 - Find a computer object in dcorp domain where we have Write permissions

2 - Abuse the Write permissions to access that computer as Domain Admin

Flag 28 [dcorp-dc] - Computer account on which ciadmin can configure Resource-based Constrained Delegation 🚩

Solutions

1 - Find a computer object in dcorp domain where we have Write permissions

Let's use PowerView from a PowerShell session started using Invisi-Shell to enumerate Write permissions for a user that we have compromised.

C:\AD\Tools\InviShell\RunWithRegistryNonAdmin.bat
. C:\AD\Tools\Powerview.ps1
Find-InterestingDomainACL | ?{$_.identityreferencename -match 'ciadmin'}
ObjectDN                : CN=DCORP-MGMT,OU=Servers,DC=dollarcorp,DC=moneycorp,DC=local
AceQualifier            : AccessAllowed
ActiveDirectoryRights   : ListChildren, ReadProperty, GenericWrite
ObjectAceType           : None
AceFlags                : None
AceType                 : AccessAllowed
InheritanceFlags        : None
SecurityIdentifier      : S-1-5-21-719815819-3726368948-3917688648-1121
IdentityReferenceName   : ciadmin
IdentityReferenceDomain : dollarcorp.moneycorp.local
IdentityReferenceDN     : CN=ci admin,CN=Users,DC=dollarcorp,DC=moneycorp,DC=local
IdentityReferenceClass  : user

2 - Abuse the Write permissions to access that computer as Domain Admin

Recall that we compromised ciadmin from dcorp-ci (on learning object 5). We can either use the reverse shell we have on dcorp-ci as ciadmin or extract the credentials from dcorp-ci.

Let's use the reverse shell that we have and load PowerView there:

Now, set RBCD on dcorp-mgmt for the student VMs. You may like to set it for all the student VMs in your lab instance so that your fellow students can also try it:

and check if RBCD is set correctly:

Get AES keys of your student VM (as we configured RBCD for it above). Run the below command from an elevated shell:

With Rubeus, abuse the RBCD to access dcorp-mgmt as Domain Administrator - Administrator, considering dcorp-std867$:

Check if we can access dcorp-mgmt:

Flag 28 [dcorp-dc] - Computer account on which ciadmin can configure Resource-based Constrained Delegation 🚩

DCORP-MGMT is the computer account on which ciadmin can configure Resource-based Constrained Delegation.

Last updated