Linux Post-Exploitation
The only difference from Post-Exploitation in #Pentesting is that here we would use only AD-related PE vectors which is executed in Linux OS.
Linux computers can connect to Active Directory, though it's a Microsoft technology. Also it's not required for Linux machine to be connected to AD to use Kerberos tickets.
Checking Linux and AD relations
realm
PS
Finding Kerberos Tickets
Finding tickets is very important part of Active Directory exploitation and post-exploitation. For a beginning, tickets in Linux are usually located here:
keytab files - commonly allow scripts to authenticate automatically using Kerberos without human interaction or access to a password stored in a plain text file
ccache files - credential cache is stored in /tmp directory
KRB5CCNAME
- environment variable
Crontab
Keytab Files
Ccache
Abusing Keytab
Impersonate user
KeyTabExtract
[LINK] This is tool which is extracting Kerberos hashes from keytab file.
Abusing ccache
For using ccache files you need to have root privileges
Checking group privileges
Now after locating right non-expired Kerberos ticket, we could import ccache file into our session by changing value of KRB5CCNAME
env and checking tickets with klist.
If the result is the same, we could be sure that now Kerberos is using our ticket.
Ticket Converter
Importing Kerberos Ticket
Last updated