NTLM Relaying via Cobalt Strike – Rasta Mouse
https://rastamouse.me/ntlm-relaying-via-cobalt-strike/
https://rastamouse.me/ntlm-relaying-via-cobalt-strike/
If you are an active directory security practitioner or if you are just getting started learning about active directory. This is a good resource to fill your domain with accounts and objects in a lab environment
https://github.com/davidprowe/BadBlood
https://github.com/davidprowe/BadBlood
GitHub
GitHub - davidprowe/BadBlood: BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure…
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world....
Fuzzing Windows RPC with RpcView | itm4n's blog
https://itm4n.github.io/fuzzing-windows-rpc-rpcview/
https://itm4n.github.io/fuzzing-windows-rpc-rpcview/
itm4n’s blog
Fuzzing Windows RPC with RpcView
The recent release of PetitPotam by @topotam77 motivated me to get back to Windows RPC fuzzing. On this occasion, I thought it would be cool to write a blog post explaining how one can get into this security research area.
Resolve domains into IP address:
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"
"cat subdomain.txt | xargs dig | grep A | grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" >> liveip.txt"