Child -> Parent Trusts
from Windows
Mimikatz
Obtaining the KRBTGT Account's NT Hash using Mimikatz
.\mimikatz.exe "lsadump::dcsync /user:CHILD\krbtgt" exitUsing Get-DomainSID
Import-Module .\PowerView.ps1
Get-DomainSIDObtaining Enterprise Admins Group's SID using Get-DomainGroup
Creating a Golden Ticket with Mimikatz
Rubeus
Creating a Golden Ticket using Rubeus
Confirming the Ticket is in Memory Using klist
Performing a DCSync Attack
from Linux
Manual Attack
Performing DCSync with secretsdump.py
Performing SID Brute Forcing using lookupsid.py
Grabbing the Domain SID & Attaching to Enterprise Admin's RID
Constructing a Golden Ticket using ticketer.py
Setting the KRB5CCNAME Environment Variable
Getting a SYSTEM shell using Impacket's psexec.py
Automatic Attack (raiseChild.py)
Última actualización
¿Te fue útil?