Linux Post-Exploitation

The only difference from Post-Exploitation in #Pentesting is that here we would use only AD-related PE vectors which is executed in Linux OS.

Linux computers can connect to Active Directory, though it's a Microsoft technology. Also it's not required for Linux machine to be connected to AD to use Kerberos tickets.

Checking Linux and AD relations

realm

realm list

PS

ps -ef | grep -i "winbind\|sssd"

Finding Kerberos Tickets

Finding tickets is very important part of Active Directory exploitation and post-exploitation. For a beginning, tickets in Linux are usually located here:

  • keytab files - commonly allow scripts to authenticate automatically using Kerberos without human interaction or access to a password stored in a plain text file

  • ccache files - credential cache is stored in /tmp directory

  • KRB5CCNAME - environment variable

Crontab

crontab -l

Keytab Files

Ccache

Abusing Keytab

Impersonate user

KeyTabExtract

[LINK] This is tool which is extracting Kerberos hashes from keytab file.

Abusing ccache

For using ccache files you need to have root privileges

Checking group privileges

Now after locating right non-expired Kerberos ticket, we could import ccache file into our session by changing value of KRB5CCNAME env and checking tickets with klist.

If the result is the same, we could be sure that now Kerberos is using our ticket.

Ticket Converter

Importing Kerberos Ticket

Last updated