C2-Tool-Collection icon indicating copy to clipboard operation
C2-Tool-Collection copied to clipboard

Kerberoast roast command is now OPSEC safe

Open Firat-NVISO opened this issue 3 years ago • 6 comments

Changed Kerberoast so it doesn't perform the heavily signatured LDAP query when you use the roast command, as it was unnecessary for targeted kerberoasting. Also added dynamic architecture selection in the cna script + building of x86 and x64 in makefile (didn't do this for everything).

Firat-NVISO avatar Nov 29 '22 10:11 Firat-NVISO

Changed Kerberoast so it doesn't perform the heavily signatured LDAP query when you use the roast command, as it was unnecessary for targeted kerberoasting. Also added dynamic architecture selection in the cna script + building of x86 and x64 in makefile (didn't do this for everything).

Nice, i'll take a look at the changes asap.

Cn33liz avatar Nov 29 '22 11:11 Cn33liz

Thanks! It's not a big pull request, but I learned the hard way that Kerberoast performs that ldap query when you specify one user (was late and I was tired, didn't test in our lab first 😅). Just did some quick patching and using it again now.

Kind regards,

Firat


From: Cn33liz @.> Sent: Tuesday, November 29, 2022 12:21:04 PM To: outflanknl/C2-Tool-Collection @.> Cc: Firat Acar @.>; State change @.> Subject: Re: [outflanknl/C2-Tool-Collection] Kerberoast roast command is now OPSEC safe (PR #4)

Changed Kerberoast so it doesn't perform the heavily signatured LDAP query when you use the roast command, as it was unnecessary for targeted kerberoasting. Also added dynamic architecture selection in the cna script + building of x86 and x64 in makefile (didn't do this for everything).

Nice, i'll take a look at the changes asap.

— Reply to this email directly, view it on GitHubhttps://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Foutflanknl%2FC2-Tool-Collection%2Fpull%2F4%23issuecomment-1330474800&data=05%7C01%7Cfacar%40nviso.de%7Cc90a1b2d29924432bf5408dad1fbcea9%7C164afbb8055043cc94da24e7f8574228%7C1%7C0%7C638053176692992088%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=O47Z7SQRwsoeFjkxXoaEHMpyPKJTznwqrVJqxn6yeE8%3D&reserved=0, or unsubscribehttps://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fnotifications%2Funsubscribe-auth%2FARW3KL4Z5RWIBGOZY76YKK3WKXRKBANCNFSM6AAAAAASOKYDYA&data=05%7C01%7Cfacar%40nviso.de%7Cc90a1b2d29924432bf5408dad1fbcea9%7C164afbb8055043cc94da24e7f8574228%7C1%7C0%7C638053176692992088%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=eo6GJroP8fE5p%2B5QossNesiQdF%2FTEPhphXw%2BjAfo7kY%3D&reserved=0. You are receiving this because you modified the open/close state.Message ID: @.***>

Classification: Internal

Firat-NVISO avatar Nov 29 '22 11:11 Firat-NVISO

Hi, i used your feedback/changes en made an update to the Kerberoast code. Code is bit different then your change but works the same. Could you check if this works for you?

Cn33liz avatar Dec 09 '22 11:12 Cn33liz

Hey,

It looks good, but is the UserAccountControl check really necessary for a targeted Kerberoast? If you’re doing a targeted kerberoast, you should know the details about the account (e.g. enabled or not). The current query might still look suspicious according to some rules.

Kind regards!

Firat-NVISO avatar Dec 09 '22 13:12 Firat-NVISO

Good one.. If it still looks suspicious then i think it's best to remove it from the query. I'll update asap.

Cn33liz avatar Dec 09 '22 13:12 Cn33liz

Thank you! I wouldn't say suspicious per se, but it's unnecessary and at least part of quite some signatured queries.

Firat-NVISO avatar Dec 09 '22 14:12 Firat-NVISO