Another Delegation Edge Case
Posted on Mon 17 May 2021 in Active Directory
While coding the cross domain S4U into Rubeus I only really considered the situation where the user that was to be impersonated was in the target/foreign domain, but not if the user was in the source/local domain. After looking at how the process of requesting delegation worked when impersonating a user on the local domain, I decided to write this post detailing how it works and when it might be useful.
The information in this post is reasonably complex and I won't be going over previous work on how S4U works, the best places to see this is probably the Microsoft Documentation and Elad Shamir's post. It might also be helpful to check out my original post on cross domain S4U if you haven't already.
So let's get to it.
The Standard Process
I've created a diagram for showing how these tickets are requested when the OS performs this type of delegation:
This can understandably look a little intimidating, so let's break it down:
-
The service account gets its standard TGT from the local DC, this is nothing interesting and included for the sake of completion. (1 and 2)
-
The account connects to the service accounts SPN using a standard service ticket, which is forwardable. (3)
-
The service account uses its TGT to request a referral TGT from the local DC for the foreign domain where the end service resides (krbtgt/Domain2). (4 and 5)
-
The service account uses its TGT, with the standard service ticket (provided by the connecting account) as an additional ticket, to request a service ticket for the end service SPN from the local DC. This results in what I'm calling a delegated referral TGT for the foreign domain being issued by the local DC. (6 and 7)
-
The service account uses its referral TGT to request a service ticket for itself for the end service from the foreign DC. (8 and 9)
-
The service account finally requests the delegated service ticket for the end service as the connecting user account from the foreign DC using the service accounts referral TGT and the delegated referral TGT (obtained in step 4 in this list or 6 and 7 in the image) as an additional ticket. (10 and 11)
From this we can determine that the main thing that is required to impersonate a local account on a service on a foreign domain is a forwardable service ticket from that account.
With this in mind, I decided to try to find a scenario this might be useful in.
The Situation
The following diagram shows the relevant part of the lab setup for this demonstration:
The position we are currently in is we have compromised the low privileged user child.user in the child domain child1.internal.zeroday.lab.
For the sake of simplicity, this user has an SPN set:
There are many ways to obtain an account with an SPN, including creating a machine account, compromising an account with an SPN, adding an SPN to an account you have Write privileges on. The other important thing here is that the user child.user has GenericWrite privileges on the machine account ISQL1 on the parent domain (internal.zeroday.lab):
The last thing to note here is the machine account quota for the parent domain (internal.zeroday.lab) is set to 0:
So there's no creating machine accounts to hop across the trust, as I demonstrated in a previous blog post.
Gaining Access to ISQL1
Due to having GenericWrite privileges on ISQL1 it is possible to configure resource-based constrained delegation (RBCD) to allow ourselves the ability to delegate to it:
At this point child1.internal.zeroday.lab\child.user can delegate to internal.zeroday.lab\ISQL1$.
The first thing we might try is to delegate to an administrative user on the foreign domain (internal.zeroday.lab), internal.admin is a member of the Domain Admins group so might be a good option. Using the Rubeus additions I did here I can try the following command to impersonate internal.admin:
1 |
|
This results in a KDC_ERR_BADOPTION
error, as shown below:
We can see the reason for this by looking at the S4U2Self ticket returned by the local DC (IC1DC1.child1.internal.zeroday.lab) with Rubeus' describe
command:
This ticket does not have the forwardable flag set, meaning it can't be used to perform the S4U2Proxy extension. Looking at the user internal.admin we can see that it is protected from delegation:
So the question becomes, what can we do if all users in the foreign domain with the desired privileges on the target system are protected from delegation? Well, there are several potential attack paths but the one we're going to focus on here is impersonating a user in the local domain that has administrative privileges on the target system. Again for simplicity sake, I've just added a user (child1.internal.zeroday.lab\sql.admin) to the local Administrators group on ISQL1:
With what we know about the process of obtaining a service ticket for child1.internal.zeroday.lab\sql.admin to internal.zeroday.lab\ISQL1, all we require is a forwardable service ticket to our account (child1.internal.zeroday.lab\child.user). Using a trick Elad mentions in the A Forwardable Result section of his Wagging the Dog post, all service tickets produced by S4U2Proxy is always forwardable.
This means that providing the user sql.admin can be delegated (shown below), we can obtain a forwardable service ticket using RBCD.
So configuring RBCD on ourselves (child.user) so we can delegate to ourselves:
The following Rubeus command was used to retrieve a forwardable service ticket as the user sql.admin for the SPN blah/foobar (just a junk one for demonstration purposes) which belongs to the account child.user:
1 |
|
Using Rubeus' describe
command shows that this ticket is forwardable:
Now everything is in place to gain access to the remote system ISQL1. The following requests is the process in full described earlier to obtain the desired delegated service ticket for CIFS/ISQL1.internal.zeroday.lab as the user child1.internal.zeroday.lab, with any requests not required omitted. Each request, except gaining the TGT initially, are made manually using the asktgs
Rubeus command.
Firstly the TGT for the service account (child.user) is required:
We already have the forwardable service ticket to child.user, so we don't need to worry about that. Next we have to obtain a referral TGT as the service account (child.user) for the foreign domain (internal.zeroday.lab), for this we only require the TGT just obtained. We can use the following command for that:
1 |
|
The last thing we require from the local DC is the delegated referral TGT, to get this I made another PR to Rubeus which allows for including additional tickets when using asktgs
by providing the /tgs:X
argument. Using the following command and including the primary TGT for the service account (child.user) as the /ticket:X
argument and the forwardable service ticket as the /tgs:X
argument, it is possible to request this delegated referral TGT:
1 |
|
We can skip requesting a service ticket for the end service using only the referral TGT for child.user as we won't be using that ticket. The last thing we need to do it request the final service ticket for CIFS/ISQL1.internal.zeroday.lab from the DC for the domain internal.zeroday.lab (IDC1.internal.zeroday.lab), this is the ticket we can use to impersonate sql.admin on the target service. To do this we use a similar command to the one we just run, except instead of the TGT and fowardable service ticket, we use the referral TGT and delegated referral TGT, and instead of the local DC we request it from the foreign DC, you also have to pass Rubeus the /usesvcdomain
switch because cross-domain stuff is hard:
1 |
|
And finally we get the service ticket we're after:
Using this ticket gives as access to the CIFS service on the target ISQL1:
Conclusion
While this attack path is probably not normally required, due to other easier attack paths being likely possible, it does show that unsual edge cases exist that could allow for privilege escalation within a domain or even across domain trusts. Defenders should therefore ensure that they are fully aware of the configuration of their whole enterprise and the implications any of those configurations could have on the security of the infrastructure as a whole.