Active Directory (Part 12.1)
Exploitation
- ForceChangePassword- Ability to set the user's current password without knowing it.
- AddMember- Ability to add users, groups or computers to the target group.
- GenericAll- Complete control over the object including the ability to change the user's password, register an SPN or add an AD object to the target group.
- GenericWrite- Update any unprotected parameters of the target object.
- WriteOwner- Ability to update the owner of the target object.
- WriteDACL- Ability to write new ACEs to target object's DACL.
- AllExtendedRights- Ability to perform any action associated with extended AD rights against the target object.
To exploit these ACEs the penetration tester will require a method to interact with AD to make these requests. Best options are AD-RSAT PowerShell cmdlets or PowerSploit.
Kerberos Delegation
Kerberos Delegation enables an application to access resources hosted on a different server. Unconstrained Delegation is the least secure method. It offer no limits to the delegations. If an attacker compromised a host with this delegation enabled, they could attempt to force a privileged account to authenticate to the host, which would allow them to intercept the generated TGT (ticket-granting ticket) and impersonate the privileged service. Some examples of the services that can be configured for delegation are:
- HTTP- Used for web applications to allow pass-through authentication using AD credentials.
- CIFS- Common Internet File System is used for file sharing that allows delegation of users to shares.
- LDAP- Used to delegate to the LDAP service for actions like resetting a user's password.
- HOST- Allows delegation of account for all activities on the host.
- MSSQL- Allows delegation of user accounts to the SQL service for pass-through authentication databases.
Exploiting Constrained Delegation is usually more complex than exploiting Unconstrained Delegation since the delegated account can't just be used for everything. There are three types of Kerberos Delegation: Unconstrained Delegation, Constrained Delegation, and Resource-Based Constrained Delegation (RBCD).
RBCD provides additional restrictions on Kerberos Delegation for improved security. It changes the delegation model by allowing the service to specify which objects can delegate to it, rather than specifying which objects can delegate to a particular service. Hence, the service owner can control which accounts have access to the service.
Comments
Post a Comment