Abuse Info
TGT delegation allows an attacker to capture TGTs of privileged users or computers in the target domain when they authenticate against a system configured with unconstrained delegation. A common attack method involves the attacker logging into a DC of the source domain and coercing a DC of the target domain. Since DCs have unconstrained delegation enabled by default, this grants the attacker a TGT for a target domain DC, which can then be used to perform a DCSync attack on the target domain. This guide details that version of the attack. Alternatively, attackers can target other privileged computers or users besides DCs. The attack will fail if the target is a member of Protected Users or is marked as not trusted for delegation, as their TGTs will not be sent to hosts with unconstrained delegation. You can identify all protected principals using the following Cypher query in BloodHound:Attack
Step 1: Start Monitoring for TGTs Windows: Log into a DC of the source domain and open a command prompt as Administrator. Start monitoring for incoming TGTs using Rubeus:Opsec Considerations
The attack can be detected by correlating Windows security events from the attacker-controlled host and the target. See the reference “Hunting in Active Directory: Unconstrained Delegation & Forests Trusts” for details.References
- Not A Security Boundary: Breaking Forest Trusts
- Hunting in Active Directory: Unconstrained Delegation & Forests Trusts
- Abusing Users Configured with Unconstrained Delegation
- SID filter as security boundary between domains? (Part 7) - Trust account attack - from trusting to trusted
- “Relaying” Kerberos - Having fun with unconstrained delegation
- Windows Coerced Authentication Methods
- Rubeus
- SpoolSample
- mimikatz
- krbrelayx.py
- printerbug.py
- secretsdump.py
- Updates to TGT delegation across incoming trusts in Windows Server
- Microsoft AD Trust Technical Documentation