📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • Configuring
  • Attacking
  • How it works
  • Tools
  • Executing the attack
  • Defending
  • Recommendations
  • Detection
  • References
Edit on GitHub
  1. Vulnerabilities & Misconfigurations & Attacks
  2. Active Directory Attacks

Empty password

It is possible that accounts have an empty password if the useraccountcontrol attribute contains the value PASSWD_NOT_REQ.

PreviousAS-REP RoastingNextPassword in description

Last updated 2 years ago

Configuring

  1. Login on DC02 with the username Administrator and password Welcome01!.

  2. Open the "Active Directory Users and Computers" administration tool on DC02

3. Click on "View" and enable "Advanced Features".

4. Right click the "Users" section and select "New" and then "User". Create a new user named bank_dev with the password Password01!. Make sure to deselect "User must change password at next logon" and select "Password never expires".

4. Right click the user and select "Properties". Open the tab "Attribute Editor", search for "Useraccountcontrol" and click "Edit".

5. Set the value to 544 and cick "OK".

6. Click "Apply" and "OK".

7. Right click on bank_dev and select "Reset Password". Uncheck "User must change password at next logon" and make sure the Password fields are empty. Click on "OK"

Attacking

How it works

It is possible that accounts have an empty password if the useraccountcontrol attribute contains the value PASSWD_NOT_REQ. With access to a normal domain user we could request all users with this attribute set.

Tools

Executing the attack

  1. Use the discovered credentials john and password Welcome2022! with CrackMapExec to authenticate over ldap and request all users with the value PASSWD_NOT_REQ set.

crackmapexec ldap 10.0.0.3 -u john -p Welcome2022! --password-not-required

2. We already knew the user steve had a empty password from our initial access attacks. The Guest password is empty by default, but this account is also disabled by default. We can check if bank_dev user has a empty password just like we did earlier.

crackmapexec smb 10.0.0.3 -u bank_dev -p ''

The password is indeed empty.

Defending

Recommendations

  • Periodically check for users with the PASSWD_NOT_REQ attribute and remove it.

Check for users with the attribute:

Get-ADUser -Filter {PasswordNotRequired -eq $true} | Select-Object samAccountName

Remove the attribute:

Set-ADAccountControl -PasswordNotRequired $false -Identity <USER>

Check for users with the attribute and remove the attribute:

Get-ADUser -Filter {PasswordNotRequired -eq $true} | Set-ADAccountControl -PasswordNotRequired $false

Detection

References

CrackMapExec
Find AD accounts using Password-Not-Required (blank password)Specops Software
PowerSploit/PowerView.ps1 at master · PowerShellMafia/PowerSploitGitHub
Logo
GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networksGitHub
Logo
Logo