Skip to content

Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccountQuota=0

Notifications You must be signed in to change notification settings

woaiqiukui/sam-the-admin-maq

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

Adding the sam_the_admin_maq when MachineAccountQuota=0

改动

在原项目:sam-the-admin中,maq等于0也就是域用户没有权限添加机器用户的时候无法进行利用

在当前项目添加了maq为0时的自动化利用,通过获取域用户修改已存在的机器用户samname进行利用

在脚本中已加入自动修改机器用户的ntlm功能以获取TGT,并在利用完成后对机器用户的ntlm和spn自动进行恢复

在进行ntlm恢复的时候需要手动输入机器用户的IP

Usage

maq为0

image

使用原版的exp无法进行利用

image

通过sam-the-admin-maq自动化利用

asciicast

Check out

About

Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccountQuota=0

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%