Довольно интересна и свежая серия статей, в частности по AD и чуть-чуть туннелям
1. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
2. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
3. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
#ad #pentest #redteam #lofl
1. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
2. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
3. https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
#ad #pentest #redteam #lofl
Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
🔄 Active Directory GPOs through NTLM relaying, and more!
Learn about a attack vector that exploits GPOs through NTLM relaying, potentially allowing unauthenticated attackers to abuse.
🌐 Source:
https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more
#ad #gpo #relay #ntlm
Learn about a attack vector that exploits GPOs through NTLM relaying, potentially allowing unauthenticated attackers to abuse.
🌐 Source:
https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more
#ad #gpo #relay #ntlm
Интересный способ кражи токенов доступа Windows с использованием WTS API в обход EDR
https://medium.com/@omribaso/wts-api-wasteland-remote-token-impersonation-in-another-level-a23965e8227e
#creds #ad #redteam #pentest
https://medium.com/@omribaso/wts-api-wasteland-remote-token-impersonation-in-another-level-a23965e8227e
#creds #ad #redteam #pentest
Medium
WTS API Wasteland — (Remote) Token Impersonation In Another Level
Whoami?
CVE-2023-36745: Microsoft Exchange Server RCE
https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/
PoC: https://github.com/N1k0la-T/CVE-2023-36745
#exploit #ad #redteam #pentest
https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/
PoC: https://github.com/N1k0la-T/CVE-2023-36745
#exploit #ad #redteam #pentest
Penetration Testing
Microsoft Exchange Server RCE (CVE-2023-36745) Flaw Gets PoC Exploit
Proof-of-concept (PoC) exploit code has been published for a Microsoft Exchange Server vulnerability tracked as CVE-2023-36745
Чуть-чуть про Lateral Movement через DCOM
https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
#ad #lateralmovement #pentest #redteam
https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
#ad #lateralmovement #pentest #redteam
Medium
Lateral Movement: Abuse the Power of DCOM Excel Application
In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within the distributed…
Forwarded from APT
📄 ADCS: New Ways to Abuse ManageCA Permissions
The Certsrv service exhibits a race condition during the creation of CRL files, any standard user with ManageCA ACL and publish the CDP and carry out arbitrary file movements, ultimately leading to domain elevation of privileges.
🔗 https://whoamianony.top/posts/ad-cs-new-ways-to-abuse-manageca-permissions/
#ad #adcs #manageca #privesc
The Certsrv service exhibits a race condition during the creation of CRL files, any standard user with ManageCA ACL and publish the CDP and carry out arbitrary file movements, ultimately leading to domain elevation of privileges.
🔗 https://whoamianony.top/posts/ad-cs-new-ways-to-abuse-manageca-permissions/
#ad #adcs #manageca #privesc
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2023-36003 (Windows LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
Исправлено в патче от 12 декабря
#lpe #ad #pentest #redteam
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
Исправлено в патче от 12 декабря
#lpe #ad #pentest #redteam
Полезное исследование методов сбора информации в домене Active Directory и способов их обнаружения.
https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
#redteam #ad #pentest #bypass
https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/
#redteam #ad #pentest #bypass
MDSec
Active Directory Enumeration for Red Teams - MDSec
The Directory Service is the heart and soul of many organisations, and whether its Active Directory, OpenLDAP or something more exotic, as a source of much knowledge it often acts...
Так, ADCS ESC13
https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53
P.S. А 12 тоже мимо вас прошел😅
#ad #adcs #pentest #redteam
https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53
P.S. А 12 тоже мимо вас прошел😅
#ad #adcs #pentest #redteam
Medium
ADCS ESC13 Abuse Technique
It is possible to configure an Active Directory Certificate Services (ADCS) certificate template with an issuance policy having an OID…
CVE-2024-21413: Microsoft Outlook Leak Hash
https://github.com/duy-31/CVE-2024-21413
#exploit #pentest #redteam #ad
https://github.com/duy-31/CVE-2024-21413
#exploit #pentest #redteam #ad
GitHub
GitHub - duy-31/CVE-2024-21413: Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC - duy-31/CVE-2024-21413
Ещё один пост SpecterOps про компрометацию SCCM
https://posts.specterops.io/sccm-hierarchy-takeover-with-high-availability-7dcbd3696b43
#ad #sccm #pentest #redteam
https://posts.specterops.io/sccm-hierarchy-takeover-with-high-availability-7dcbd3696b43
#ad #sccm #pentest #redteam
Medium
SCCM Hierarchy Takeover with High Availability
TL;DR: SCCM sites configured to support high availability can be abused to compromise the entire hierarchy
Про латераль из облака Azure к локальной среде
https://whiteknightlabs.com/2024/02/21/pivoting-from-microsoft-cloud-to-on-premise-machines/
#azure #ad #pentest #redteam
https://whiteknightlabs.com/2024/02/21/pivoting-from-microsoft-cloud-to-on-premise-machines/
#azure #ad #pentest #redteam
White Knight Labs
Pivoting from Microsoft Cloud to On-Premise Machines | White Knight Labs
This article will demonstrate one situation discovered during a recent cloud penetration test that allowed us to pivot from a Microsoft cloud
Про принудительную аутентификацию самого центра сертификации ADCS
https://decoder.cloud/2024/02/26/hello-im-your-adcs-server-and-i-want-to-authenticate-against-you/
Не знаю в чем цель, но все равно прикольно😅
#ad #pentest #redteam #adcs
https://decoder.cloud/2024/02/26/hello-im-your-adcs-server-and-i-want-to-authenticate-against-you/
Не знаю в чем цель, но все равно прикольно😅
#ad #pentest #redteam #adcs
Decoder's Blog
Hello: I’m your ADCS server and I want to authenticate against you
In my exploration of all the components and configurations related to the Windows Active Directory Certification Services (ADCS), after the “deep dive” in Cert Publishers group, I decid…
Ralf Hacker Channel
Так, ADCS ESC13 https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53 P.S. А 12 тоже мимо вас прошел😅 #ad #adcs #pentest #redteam
ADCS ESC 14...
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9
А еще много будет?
#ad #redteam #pentest #adcs
https://posts.specterops.io/adcs-esc14-abuse-technique-333a004dc2b9
А еще много будет?
#ad #redteam #pentest #adcs
Medium
ADCS ESC14 Abuse Technique
The altSecurityIdentities attribute of Active Directory (AD) computers and users allows you to specify explicit certificate mappings. An…
От MS Exchange к компрометации домена AD
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
P.S. складывается ощущение, что статья неполная😅
#ad #pentest #redteam
https://posts.specterops.io/pwned-by-the-mail-carrier-0750edfad43b
P.S. складывается ощущение, что статья неполная😅
#ad #pentest #redteam
Medium
Pwned by the Mail Carrier
How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that
Много же кто знаком с прекрасным проектом GOAD? Так вот из той же категории выпущена лаборатория SCCM. Качайте и играйтесь)))
https://mayfly277.github.io/posts/SCCM-LAB-part0x0/
#ad #lab #pentest
https://mayfly277.github.io/posts/SCCM-LAB-part0x0/
#ad #lab #pentest