Skip to content

Exploitation

Dirk-jan edited this page Dec 4, 2018 · 1 revision

Exploitation

There are two main strategies for exploitation:

  • Assign all privileges to the user/computer account from which you are performing the exploitation.
  • Assign all privileges to a different account and only use the initial account for the first step.

In either strategy, you will need the password of the user or computer account that you are escalating from (specified with the -f flag). This can be supplied using the --source-password parameter. If it is not specified, aclpwn will prompt for it.

Assigning privileges to a different user

It is also possible to assign the privileges to a different account under the attackers control. For example we may want to assign the DCSync privileges to the account testuser instead of to a computer account. To do this, specify the --user flag. If you have an attack chain with only one step, this will just assign the privileges to this user and finish. If however you have a multi step exploitation chain, aclpwn will need the password (or the LM:NTLM hashes) of this user to perform the next step in the escalation chain. You can either specify it manually with the --password flag or you can wait till aclpwn prompts for the password.

Clone this wiki locally