Dominance

Kerberos Tickets Forgery

Silver Ticket

Via S4U2self:

Golden Ticket

Diamond Ticket

Using ticketer.pyarrow-up-right:

Using Rubeusarrow-up-right's "Recutted Diamond" to obtain an OpSec Silver Ticket:

Sapphire Ticket

Tools

AdminSDHolder Modification

Create a Backdoor

Add a new domain user or grant an existent user GenericAll permissions for the AdminSDHolder container:

Check that granting AdminSDHolder permissions was successful (may take 60+ minutes for the security ACLs to get updated for that user):

Now you can add yourself (the "snovvcrash" user) to the Domain Admins group any time and do stuff (actually adding the user to Domain Admins every time is not necessary, as the AdminCount attribute will stay 1 anyways after adding the backdoor user to a protected group for the first time):

Remove the Backdoor

Disable or remove the account (if a new user was created):

Remove user AdminSDHolder container via GUI (ADUC, dsa.msc).

Clear the AdminCount attribute (will be resetted if the user is still in the AdminSDHolder container):

Fix the inheritance rules:

SERVER_TRUST_ACCOUNT

When DA is owned (or any other account with DS-Install-Replica permission), you can create a fake machine account (or use an existing real machine account), set SERVER_TRUST_ACCOUNT bit for it and perform DCSync on behalf of this account to regain domain dominance.

1. Create a fake machine account:

2. Set the SERVER_TRUST_ACCOUNT bit:

3. Perform DCSync:

4. Clean up:

KRBTGT Constrained Delegation

Last updated