Jump between domains – Enterprise Admins Golden Ticket

Categories: Uncategorized

How to take over all the domains. But let’s add a quick recap first.

To build an active directory domain, you start with a root domain, for example, UNIXAWY.CORP, which is the root domain/company, then you start a new branch or merge and acquisition a new company, then you want to extend your network for the branch-like us.unixawy. Corp, which is a different domain with its separate administrators, users, databases, etc.

Concepts

Enterprise Admins

Enterprise admins is a particular group, and it does not exist in each domain of the forest, it only exists for the root domain where the users of these group can take control over subdomains.

krbtgt – Golden Ticket

Golden ticket is well documented attack that allow the attacker to generate a ticket granting ticket tgt as anyuser by using the krbtgt hash.

this attack usually executed after you compromise the domain controller or gain access to high privilege account

DCSync Attack

A remote protocol called Directory Replication Service, which an object with replication rights can request to synchronize with a target domain to act as a replica and get a full clone of the target domain.

High-Level Plan

When a subdomain or child domain gets popped by attacker and krbtgt is leaked, the attacker can spoof any user or even can create a ticket to none exit user. this is a power for the attacker, but a real adversary will take this attack to a different level by abusing the same concept and add a little bit of twist

When you generate a golden ticket, you specify the SID of the domain you compromised. Still, also, you can provide move SIDs for the user you are creating this ticket for. and here is the game, you can specify the SID of the enterprise admin group of the root domain. this new ticket will have full administration rights over all the child domains and the root domain

Craft EA Golden for total domination

lets assume you compromised child domain “operators.unixawy.corp” and you domain domain and you was able to extract the krbtgt hash

Step one – EA SID

First, we need to collect the Enterprise Admin group SID you don’t need to have any permission over UNIXAWY.corp

Step two – Current Domain SID

by using Mimikatz, we can list the domain trust we have and get the SID for each domain including the current domain

Step three – Collect the krbtgt hash for the child domain

Step four – Create Golden Enterprise admin

with the generated ticket you can now DCSync any child domain or the root domain 🙂

One domain get compromised the full tree will get compromised!

«

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.