PRIMARY CATEGORY → KERBEROS

Components

Types of Delegation



Recon

findDelegation.py

Impacket

findDelegation.py

findDelegation.py -target-domain <DOMAIN> '<DOMAIN>/<USER>:<PASSWORD>'
Active Directory Module

Powershell Module

AD Module

PROPERTYDELEGATION TYPE
TrustedForDelegationKUD
TrustedToAuthForDelegationKCD with Protocol Transition
msDS-AllowedToDelegateToKCD
PrincipalsAllowedToDelegateToAccountRBCD
Get-ADComputer "Account" -Properties TrustedForDelegation, TrustedToAuthForDelegation, msDS-AllowedToDelegateTo, PrincipalsAllowedToDelegateToAccount
Powerview

Powerview

KCD
  • User Accounts
Get-DomainUser -TrustedToAuth
  • Computer Accounts
Get-DomainComputer -TrustedToAuth
RBCD
  • User Accounts
Get-DomainUser | Where-Object {$_.'msDS-AllowedToActOnBehalfOfOtherIdentity' -ne $null}
  • Computer Accounts
Get-DomainComputer | Where-Object {$_.'msDS-AllowedToActOnBehalfOfOtherIdentity' -ne $null}
Bloodhound

Bloodhound

KUD
MATCH (c {unconstraineddelegation:true}) return c
KCD with Protocol Transition
MATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c
KCD w/o Protocol Transition (Kerberos Only)
MATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c
RBCD
MATCH p=(u)-[:AllowedToAct]->(c) RETURN p
Bloodhound Cypher Cheatsheet

Reference

Filter by the Delegation term


Type of Services

Interesting when modifying the SNAME field of a Service Ticket

Reference

SERVICE TYPEST’s SNAME
WMIHOST
RPCSS
MS-PSRPHOST
HTTP
Depending on the OS:
WSMAN
RPCSS
WinRMHOST
HTTP
WINRM
Scheduled TasksHOST
Windows File Share or PSEXECCIFS
LDAP Operations, included DCSyncLDAP
Windows Remote Server Administration ToolsRPCSS
LDAP
CIFS
Golden TicketsKRBTGT