Refactor Badsucessor : Replace ldap3 with impacket and add dMSA exploitation#1163
Open
azoxlpf wants to merge 2 commits intoPennyw0rth:mainfrom
Open
Refactor Badsucessor : Replace ldap3 with impacket and add dMSA exploitation#1163azoxlpf wants to merge 2 commits intoPennyw0rth:mainfrom
azoxlpf wants to merge 2 commits intoPennyw0rth:mainfrom
Conversation
Member
|
Thanks for the PR, definitely a cool addition! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
This PR refactors the
badsuccessormodule to remove theldap3dependency and addfull BadSuccessor exploitationsupport, using impacket for LDAP and Kerberos.Previously, the module only
enumerated OUsvulnerable to BadSuccessor and relied onldap3for the security descriptor control. It now usesimpacket’s SDFlagsControlandLDAP CRUDoperations.When
TARGET_OUis provided, the module creates adMSA, retrievescurrent and previous keysviaS4U2Self, and saves the service ticket to a.ccache file.A
DELETE=Trueoption (withDMSA_NAMEandTARGET_OU) allows removing a created dMSA. Without options, the module keeps its original enumeration behavior.Type of change
Insert an "x" inside the brackets for relevant items (do not delete options)
Setup guide for the review
Install a Windows Server 2025 that doesn't have the patch included in the ISO.
You can verify that the server is vulnerable by running
nxc smb DC_IP -u user -p password -M enum_cve -o CVE=CVE-2025-53779:Screenshots (if appropriate):
Check for vulnerable OUs :
Create a dMSA and exploit the attack :
Delete the dMSA :
dMSA creation when the DC has the patch :
Checklist:
Insert an "x" inside the brackets for completed and relevant items (do not delete options)
poetry run ruff check ., use--fixto automatically fix what it can)tests/e2e_commands.txtfile if necessary (new modules or features are required to be added to the e2e tests)