GenericAll

Over a User

Targeted Kerberoasting

targetedKerberoast extracts Kerberoast hashes by abusing write access to set temporary SPNs on users without one, then removes them. It works on all users, a list, or a single user:

targetedKerberoast.py -v -d '<domain>' -u '<user>' -p '<pass>' --request-user '<target-account>'

Targeted ASREPRoasting

We can disable pre-authentication for the target account and then ASREPRoast it:

# Set the preauth option to true
Set-DomainObject -Identity <USER> -XOR @{UserAccountControl=4194304}

An example of the above method can be found here.

Change user's password

See here.

Over a Group

Add User to the Group

This can be done using native commands, the AD PS module, or PowerView.

Over an OU

If a group has GenericAll rights over an OU, then the group members can be assigned GenericAll rights over the OU as well, which results in them having FullControl over the OU members. This gives the ability to change any OU user's password.

Last updated

Was this helpful?