After penetration - domain authority to maintain the use of gold and silver bills bills get permission domain controller

Disclaimer: This article describes the technology is for network security professionals and white hat use, any individual or organization must not spread the use of technologies and tools in criminal acts, once discovered directly submitted to the national security agencies to deal with

Permission to maintain

Here Insert Picture Description

Gold notes

Ms14068 vulnerability principle was forged domain tube tgt, and the vulnerability of the principle of the bill is counterfeit gold krbtgt user's bill, krbtgt user domain is used to manage user control in issuing tickets, with the user's permission, you can fake system any user

Conditions golden ticket requirements:
1. Domain Name hacker.com
2. domain SID value-1-5-21-1854149318-4101476522-1845767379 S
KRBTGT account NTLM password hashes 3. domain or aes-256 value
0028977ae726d766b150520dc63df9b4
4. fake user name administrator

NTLM password hashes extraction of domain user krbtgt

lsadump::dcsync /domain:hacker.com /user:krbtgt

Forgery administrator user

kerberos::golden /admin:administrator /domain:hacker.com /sid:S-1-5-21-1836192064-1636381992-1218642615 /krbtgt:ce420fcea94d02d7051ebfb82833edf7 /ptt

Silver notes

Silver and gold ms14068 bills with the principles of the bill are not the same, ms14068 and gold notes are counterfeit tgt (tickets issued ticket), while silver bill is counterfeit st (tickets), this benefit is not the ticket after kdc, and thus more hidden, but forged tickets only on the part of service work, such as cifs (file sharing service), mssql, winrm (windows remote management), dns, etc.

Conditions silver notes requirements
1. Domain
hacker.com
2. domain SID
S-1-5-21-1854149318-4101476522-1845767379
3. target server the FQDN
dc.hacker.com
4. available services
CIFS
5. The service account the HASH NTML
52c74fc45feba971209be6f2bc068814
. 6. need fake user name
test

Obtain domain controller machine hash

mimikatz.exe privilege::debug sekurlsa::logonpasswords exit>1.txt

Silver counterfeit bills

kerberos::golden /domain:hacker.com /sid:S-1-5-21-1836192064-1636381992-1218642615 /target:dc.hacker.com /service:cifs /rc4:031091bab05b768b471a7060b6d1bbf1 /user:test /ptt

Here Insert Picture Description

lab environment:

  • Windows Server 2012 R2 x64 (the domain controller machine)
  • Windows 7 x64 sp1 (domain user machine)
  • pfSense (routing)
    ms14068

Please refer to the specific method for building domain-controlled environment within the enterprise to build a network of 30,000 words a detailed deployment tutorial

Here Insert Picture Description

Simulation:

Gold counterfeit bills

Information gathering

ipconfig /allGet a domain name
Here Insert Picture Description
whoami /allto get the SID
Here Insert Picture Description
using mimikatz software to get NTLM password hashes krbtgt user
Here Insert Picture Description
input klist purgeto delete tickets
Here Insert Picture Description

Fake ticket

Will replace the collected information to perform a ticket using mimikatz counterfeit software statements administrator user and then exit
Here Insert Picture Description
successfully got the domain controller
Here Insert Picture Description
to delete the bill and denied access
Here Insert Picture Description

Silver counterfeit bills

Information gathering

ipconfig /allGet ip domain controller
Here Insert Picture Description
input ping -a 10.1.1.1to obtain the full domain name dc.kacker.com
Here Insert Picture Description
whoami /allto get the SID
Here Insert Picture Description
export the domain controller machine hash
Here Insert Picture Description

Fake ticket

The information collected is used to replace the execution sentence mimikatz software counterfeit ticket, you can visit
Here Insert Picture Description

Published 113 original articles · won praise 1301 · Views 200,000 +

Guess you like

Origin blog.csdn.net/weixin_45728976/article/details/105290034