🟢Constrained Delegation
Dive into our comprehensive article exploring the intricacies of Constrained Delegation. Uncover its functions, role, and understanding its impact for an effective system management strategy.
Enumerate users with contrained delegation enabled
Enumerate computers with contrained delegation enabled
Constrained delegation User
Requesting TGT with kekeo
Requesting TGS with kekeo
Use Mimikatz to inject the TGS ticket
Constrained delegation Computer
Requesting TGT with a PC hash
Requesting TGS
No validation for the SPN specified
Using mimikatz to inject TGS ticket and executing DCsync
Additional Enumeration Techniques
Discover additional services allowing delegation:
Further Exploitation
Extract and Use TGT
Using the extracted TGT for impersonation:
Then, using the ticket:
Execute Commands with the Impersonated Identity
Once ticket is injected, use it to execute commands:
Where $cred
is a PSCredential object created with the credentials of any user you've impersonated.
Cleaning Up
Remember to remove any traces of your activities:
This ensures the removal of all Kerberos tickets from the current session and helps avoid detection.
Additional Resources
For more information on Kerberos delegation and related attacks, refer to the following resources:
Last updated