WinRM is protected against NTLMRelay as communications are encrypted.
https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./
https://sensepost.com/blog/2025/is-tls-more-secure-the-winrms-case./
Windows & Active Directory Exploitation Cheat Sheet and Command Reference
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.
It’s lightweight, fast, and helps turn raw recon into insights.
https://github.com/six2dez/reconftw_ai
It’s lightweight, fast, and helps turn raw recon into insights.
https://github.com/six2dez/reconftw_ai
GitHub
GitHub - six2dez/reconftw_ai: AI/LLM local model integration for analysis of reconftw results
AI/LLM local model integration for analysis of reconftw results - six2dez/reconftw_ai
GitHub - mbadanoiu/CVE-2025-31644: CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP
https://github.com/mbadanoiu/CVE-2025-31644
https://github.com/mbadanoiu/CVE-2025-31644
GitHub
GitHub - mbadanoiu/CVE-2025-31644: CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP
CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP - mbadanoiu/CVE-2025-31644
https://decoder.cloud/2025/04/24/from-ntlm-relay-to-kerberos-relay-everything-you-need-to-know/?s=35
Decoder's Blog
From NTLM relay to Kerberos relay: Everything you need to know
While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and …
Multiple Chinese 🇨🇳 nation-state APT groups have gained initial access to critical infrastructure networks through SAP NetWeaver intrusions, aiming to conduct cyber-enabled espionage and maintain persistent remote access.
https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
Eclecticiq
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
EclecticIQ analysts assess with high confidence that, in April 2025, China-nexus nation-state APTs (advanced persistent threat) launched high-temp exploitation campaigns against critical infrastructure networks by targeting SAP NetWeaver Visual Composer.