You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Write-ColorOutput yellow "[!] Found computers with unconstrained delegation and dangerous rights"
567
+
Write-ColorOutput yellow "[!] For WriteProperty on ms-DS-Additional-Dns-Host-Name, please check https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/"
568
+
}
549
569
550
570
Write-Banner-Text "Users with unconstrained delegation"
Write-Banner-Text "Finding principals (RID > 1000) with permissive rights on '$_' (DS-Replication-Get-Changes-All|WriteProperty|GenericAll|GenericWrite|WriteDacl|WriteOwner|User-Change-Password|User-Force-Change-Password)"
606
-
Write-Output"[!] Filtering out 'OU=Microsoft Exchange Security Groups'"
613
+
Write-Banner-Text "Finding principals (RID > 1000) with permissive rights on container '$_' (not looking for nested objects)"
614
+
615
+
# Write-Output "[!] Filtering out 'OU=Microsoft Exchange Security Groups'"
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,9 +22,9 @@ git clone --recurse-submodules https://github.com/phackt/Invoke-Recon.git && cd
22
22
- Privileged users with RID >= 1000 (recursive lookups for nested members of privileged groups, not AdminCount = 1 to avoid orphans)
23
23
- DNSAdmins group members
24
24
- Principals with :
25
-
- unconstrained delegation (T4D)
25
+
- unconstrained delegation
26
+
- looking for dangerous rights on computers with unconstrained delegation, see [https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/](https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/)
26
27
- constrained delegation (also resource based - msDS-AllowedToActOnBehalfOfOtherIdentity)
27
-
- constrained delegation with protocol transition (T2A4D)
28
28
- Exchange servers
29
29
- confirm WriteDAC on root domain without InheritOnly
30
30
- list users with mailboxes
@@ -38,7 +38,7 @@ git clone --recurse-submodules https://github.com/phackt/Invoke-Recon.git && cd
38
38
- Computers with deprecated OS
39
39
- Users with Kerberos PreAuth disables (AS_REP Roasting)
40
40
- Kerberoastable users
41
-
- Principals (RID >= 1000) with the following rights on **root domain**, **CN=Users**and **CN=Computers** containers:
41
+
- Principals (RID >= 1000) with the following rights on the **root domain**, **Users**, **Computers**and **Domain Controllers** containers:
0 commit comments