Skip to content
master
Switch branches/tags
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 

Mystique

PowerShell tool to play with Kerberos S4U extensions

This module can assist blue teams to identify risky Kerberos delegation configurations as well as red teams to impersonate arbitrary users by leveraging KCD with Protocol Transition

More info on Black hat slides: https://www.slideshare.net/MatanHart/delegate-to-the-top-abusing-kerberos-for-arbitrary-impersonations-and-rce

Usage

Install the module

Import-Module .\Mystique.psm1

Or just load the script (you can also IEX from web)

. .\Mystique.ps1

Make sure Set-ExecutionPolicy is Unrestricted or Bypass

Get information about a function

Get-Help Find-DelegationAccounts -Full

All fucntions also have -Verbose mode

Functions

Add-SeTcbPrivilege      - Adds the "act as part of the operating system" (SeTcbPrivilege) privilege to a user
Find-DelegationAccounts - Find accounts that are trusted for Kerberos delegation
Get-CurrentIdentity     - Retreives information about the current identity
New-Impersonation       - Impersonate a user using Protocol Transition
Read-DelegatedFlag      - Checks if a user or users in a specific group can be delegated
Undo-Impersonation      - Reverts an impersonated session to the original account

About

PowerShell module to play with Kerberos S4U extensions

Resources

License

Releases

No releases published

Packages

No packages published