CRTP
Domain Enumeration
# Users
Get-DomainUser | select samaccountname
# Computers
Get-DomainComputer | select cn
# DAs
Get-DomainGroupMember -identity "Domain Admins" | select membername
# EAs
Get-DomainGroupMember -identity "Enterprise Admins" -domain <domain> | select membername
# SIDs
Get-DomainSID
# Collect BH data
SharpHound.exe -c all --zipfilename crtp_data --outputdirectory .\Privilege Escalation
Unconstrained → impersonate any user to any service (LA → DA):
RPRN → FQDN
WSP/DFS → netBIOS
LA → EA (same as above, but different target on listener and different coercion source)
Constrained → impersonate specific users to specific hosts (LA → DA):
Access non-allowed services:
Services are case-sensitive → LDAP not ldap!
Resource-Based → same as CD, but based on the resource itself (LA → DA):
Use PowerUpSQL:
Forge a GT (pre-load SIDs on the initial TGT) (DA → EA):
The machine account can be combined with SIDs for DCs (516) and Enterprise DCs (S-1-5-9) to simulate legit replication behavior between domains (no 4672 alerts as above):
For even better OPSEC, Diamond Tickets instead of GT. These resemble legitimate Kerberos requests and include a corresponding TGT request, making them less suspicious:
Forge an inter-realm TGT (DA → EA on a specific service):
Forge an inter-realm TGT:
Templates with ENROLLEE_SUPPLIES_SUBJECT set (ESC1):
Templates with EKU for Client Authentication and Certificate Request Agent policy (ESC3):
Persistence
Forged TGT using krbtgt's creds → full domain impersonation.
Forged TGS → service-level access on a specific host.
HTTP
WinRM (Windows Remote Management)
CIFS
File system (SMB shares)
HOST
Scheduled tasks, remote service control, WMI (partial, + RPCSS)
RPCSS
WMI (+ HOST), DCOM/RPC endpoint mapper
LDAP
DCSync (requires elevated permissions)
SPN formatting: it must conform to Kerberos naming conventions (e.g., HTTP/web04.corp.com) and is case-sensitive in some deployments.
TGT tampering → Same as GT, but stealthier.
Built-in local Admin account → can't interactively access the DC by default.
Add DCSync rights to a low-priv account:
Establish privileged-independent access to remote management interfaces.
Misc
Directly:
Via WinRS:
Last updated
Was this helpful?