constrained-delegation

Constrained Delegation

Methodology

  1. Enumerate users/computers which have constrained delegation enabled (Ignore domain controllers).

  2. Understand what you can acces if you compromise the user/machine by looking at msDS-AllowedToDelegateTo.

  3. Impersonate the user or have SYSTEM on the constrained delegation machine.

  4. Impersonate the high value target and abuse the lack of SPN validation.

Powershell

[!INFO] Remember to follow the Powershell methodology

PowerView

Find objects with constrained delegation enabled:

# Users
Get-DomainUser –TrustedToAuth

# Computers
Get-DomainComputer –TrustedToAuth

Binaries

[!INFO] Remember to follow the Binaries methodology

Rubeus

Use the S4U module to inject the ticket to the current session:

Abuse the lack of verification to query another SPN:

After injecting the ticket, we can access us-mssql:

Persistence - msDS-AllowedToDelegateTo

Powershell

Powerview

Binaries

Rubeus

Last updated