RBCD GenericAll Computer
Resource-Based Constrained Delegation
Windows
Full control of a computer object can be used to perform a resource based constrained delegation attack.
First, if an attacker does not control an account with an SPN set, Kevin Robertson's Powermad project can be used to add a new attacker-controlled computer account:
PowerView can be used to then retrieve the security identifier (SID) of the newly created computer account:
We now need to build a generic ACE with the attacker-added computer SID as the principal, and get the binary bytes for the new DACL/ACE:
Next, we need to set this newly created security descriptor in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the comptuer account we're taking over, again using PowerView in this case:
We can then use Rubeus to hash the plaintext password into its RC4_HMAC form:
And finally we can use Rubeus' s4u module to get a service ticket for the service name (sname) we want to "pretend" to be "admin" for. This ticket is injected (thanks to /ptt), and in this case grants us access to the file system of the TARGETCOMPUTER:
TIP: Take the base 64 ticket that rubeus creates, remove spaces , paste into a file on your machine, use base64 -d file > newfile to convert from base64. Finally use impacket-ticketconverter to convert to ccache. Set the KRB5CCNAME environment variable to the filename and use impacket tools with ticket.
Linux
First, if an attacker does not control an account with an SPN set, a new attacker-controlled computer account can be added with Impacket's addcomputer.py example script:
We now need to configure the target object so that the attacker-controlled computer can delegate to it. Impacket's rbcd.py script can be used for that purpose:
And finally we can get a service ticket for the service name (sname) we want to "pretend" to be "admin" for. Impacket's getST.py example script can be used for that purpose.
This ticket can then be used with Pass-the-Ticket, and could grant access to the file system of the TARGETCOMPUTER.
Shadow Credentials attack
To abuse this privilege, use pyWhisker.
For other optional parameters, view the pyWhisker documentation.