Tag: Domain Privilege Escalation

Windows Privilege Escalation: Server Operator Group

In this blog, we dive into a Server Operator exploit scenario for Windows Privilege Escalation, leveraging the commonly overlooked but powerful Server Operator group in Active Directory. This Server Operator exploit allows attackers to escalate privileges to NT AUTHORITY\SYSTEM. You’ll learn step-by-step exploitation methods, lab configuration, and effective mitigation strategies. The Windows Server operating system […]

Domain Escalation: Unconstrained Delegation

Post-Windows 2000, Microsoft introduced an option where users could authenticate to one system via Kerberos and work with another system. The delegation option makes this possible. We achieve unconstrained delegation using the TGT forwarding technique, which we will discuss in this article. Kerberos Delegation Kerberos Delegation enables a service to impersonate a computer or user […]

Domain Escalation: Resource Based Constrained Delegation

Resource-Based Constrained Delegation (RBCD) is a security feature in Active Directory (AD) that allows a computer object to specify which users or machines can impersonate accounts to access its resources. This delegation method provides more granular control compared to older unconstrained and constrained delegation methods. However, attackers can exploit misconfigured RBCD to gain unauthorized access […]

Domain Escalation: PetitPotam NTLM Relay to ADCS Endpoints

Will Schroeder and Lee Christensen wrote a research paper on this technique which can be referred to here. In ESC8 technique mentioned in the research paper, they talked about an inherent vulnerability in the web interface of CA server with web enrolment service on. An attacker can, therefore, relay the requests from the web interface to […]

Windows Privilege Escalation: DnsAdmins to DomainAdmin

In this article, we will show how attackers can escalate privileges from DNSAdmins to Domain Admin in Windows environments and gain unauthorized access. We will show you a method for escalating privileges on Windows-based Devices when they contain a compromised user of the DnsAdmins Group. Table of Content Introduction Setting Up Enumeration Exploitation Indicator of […]