Resource Based Constrained Delegation

In resource based Kerberos delegation, computers (resources) specify who they trust and who can delegate authentications to them. The attacks abuses this by writing to the msDS-AllowedToActOnBehalfOfOtherIdentity attribute that a user or computer that the attacker controls can impersonate and authenticate as any domain user to the computer.

So lets say that WEB01 trusts FAKE01 due to the modified AllowedToActOnBehalfOfOtherIdentity atribute. FAKE01 can impersonate any users that is trusted for delegation and can authenticate as Domain Admin to WEB01.

The attack can (as far as I know) be performed in three ways:

  • By abusing WRITE privileges on a computer object, it is possible to write to this attribute.

  • By triggering the target workstation to authenticate over webdav to the attacker machine and relay the hash to LDAP. Writing to this attribute. Forcing to authenticate can be done:

    • From a low-priv shell by abusing Change-LockScreen.

    • If the webclient is active with petitpotam or printerbug.py.

Here are the articles in this section:

Last updated