constrained-delegation
Constrained Delegation
Methodology
Enumerate users/computers which have constrained delegation enabled (Ignore domain controllers).
Understand what you can acces if you compromise the user/machine by looking at
msDS-AllowedToDelegateTo.Impersonate the user or have SYSTEM on the constrained delegation machine.
Impersonate the high value target and abuse the lack of SPN validation.
Powershell
[!INFO] Remember to follow the Powershell methodology
PowerView
Find objects with constrained delegation enabled:
# Users
Get-DomainUser –TrustedToAuth
# Computers
Get-DomainComputer –TrustedToAuthBinaries
[!INFO] Remember to follow the Binaries methodology
Rubeus
Use the S4U module to inject the ticket to the current session:
Abuse the lack of verification to query another SPN:
After injecting the ticket, we can access us-mssql:
Persistence - msDS-AllowedToDelegateTo
Powershell
Powerview
Binaries
Rubeus
Last updated