
Sign up to save your podcasts
Or


If I was on a pentest, and the DC was called 7MS-DC01, and I could join a machine to the domain (which as a reminder - ANY user can do if the machine quota value is at the default value of 10), I could rename that machine account to be 7MS-DC01 without the dollar sign, request a TGT for the domain controller's account, then restore the machine name back to what it was before. Now, because the TGT is stored in memory, we can use the S4U2self Kerberos extension to request a service ticket using a domain admin account. And because the original ticket belong to the 7MS-DC01 machine name which now doesn't exist, Kerberos will look for 7MS-DC01$ and will issue the ticket for the requested service.
I might've butchered that explanation mom, but I tried my best!
TLDL/TLDR: find and exploit these unpatched domain controllers with noPac. Enjoy!
By Brian Johnson4.7
6868 ratings
If I was on a pentest, and the DC was called 7MS-DC01, and I could join a machine to the domain (which as a reminder - ANY user can do if the machine quota value is at the default value of 10), I could rename that machine account to be 7MS-DC01 without the dollar sign, request a TGT for the domain controller's account, then restore the machine name back to what it was before. Now, because the TGT is stored in memory, we can use the S4U2self Kerberos extension to request a service ticket using a domain admin account. And because the original ticket belong to the 7MS-DC01 machine name which now doesn't exist, Kerberos will look for 7MS-DC01$ and will issue the ticket for the requested service.
I might've butchered that explanation mom, but I tried my best!
TLDL/TLDR: find and exploit these unpatched domain controllers with noPac. Enjoy!

187 Listeners

2,005 Listeners

372 Listeners

372 Listeners

652 Listeners

1,019 Listeners

319 Listeners

417 Listeners

8,063 Listeners

178 Listeners

315 Listeners

188 Listeners

73 Listeners

139 Listeners

44 Listeners