-
Notifications
You must be signed in to change notification settings - Fork 780
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unhandled Exception: System.OverflowException: Value was either too large or too small for a UInt32. #19
Comments
The issue has been resolved! I should use another release of Rubeus in order to achieve what i want to do! |
@stathisb how did you resolve the issue? It looks like some value in KRB_ERROR is being miscast, but without being able to recreate I don't know the best way to trace which value it is. |
@HarmJ0y i was testing some case studies of the well known article "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory" of Elad Shamir. I got this issue when i tested the exploitation of unconstrained delegation in conjunction with"the printer bug". Also, the same issue arose when i tested the case-study with name "When Accounts Collude - TrustedToAuthForDelegation Who?" that illustrated by Shamir on his article. However, this attack make use of a forwardable TGS during the execution of SU4, something that is not provided by your Rubeus current release. |
So Elad's modification listed on that post (eladshamir@10689df) was integrated yesterday in the Rubeus master branch (47f330f) . If you can retest using the most up to date Rubeus master branch, let me know, but for now I'm going to close this issue out. |
@HarmJ0y , I have tested your current release against my previous unsuccessful case-studies and now it seems that the issue has been resolved! I will further inform you in case of any other issue. Thank you :) |
Hello guys,
I am using the monitor action in order to grab TGTs after a successful "attack" against the "Print Spooler" service that is running on a domain host (in our case LABS-DC01$).
Then, I am using the s4u action with the harvested TGT ticket (i have provided it both in base64 raw format and in .kirbi format after proper conversion) in order to impersonate a Domain Admin account and get a TGS ticket for the CIFS service on the DC.
The problem is that I am getting the following error during the execution of s4u action:
Execution of S4U Action:
.\Rubeus.exe s4u /impersonateuser:Administrator /ticket:<base64-ticket-value> /msdsspn:cifs/labs-dc01.labs.com
OR:
[IO.File]::WriteAllBytes("ticket.kirbi", [Convert]::FromBase64String("<base64-ticket-value>")) .\Rubeus.exe s4u /impersonateuser:Administrator /ticket:ticket.kirbi /msdsspn:cifs/labs-dc01.labs.com
Error:
Is that an issue indeed or i am missing something?
The text was updated successfully, but these errors were encountered: