Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
YouTube
[English] You Do (Not) Understand Kerberos
Understanding how Kerberos works, but also WHY it works the way it does
From the creator of AdFind, AdMod!
https://blog.joeware.net/2021/03/17/6030
Tool Link: http://www.joeware.net/freetools/tools/admod
@WindowsHackingLibrary
https://blog.joeware.net/2021/03/17/6030
Tool Link: http://www.joeware.net/freetools/tools/admod
@WindowsHackingLibrary
The Power of SeImpersonation
https://micahvandeusen.com/the-power-of-seimpersonation
@WindowsHackingLibrary
https://micahvandeusen.com/the-power-of-seimpersonation
@WindowsHackingLibrary
Micah Van Deusen’s Blog
The Power of SeImpersonation
SeImpersonate is a powerful privilege that allows the ability to impersonate any token it can acquire a handle on. This is an already well researched privilege as there are a whole slew of privilege escalations that utilize this privilege and amazing articles…
Do You Really Know About LSA Protection (RunAsPPL)?
https://itm4n.github.io/lsass-runasppl
@WindowsHackingLibrary
https://itm4n.github.io/lsass-runasppl
@WindowsHackingLibrary
itm4n’s blog
Do You Really Know About LSA Protection (RunAsPPL)?
When it comes to protecting against credentials theft on Windows, enabling LSA Protection (a.k.a. RunAsPPL) on LSASS may be considered as the very first recommendation to implement. But do you really know what a PPL is? In this post, I want to cover some…
w0rk3r's Windows Hacking Library
Do You Really Know About LSA Protection (RunAsPPL)? https://itm4n.github.io/lsass-runasppl @WindowsHackingLibrary
Bypassing LSA Protection in Userland
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland
Tool: https://github.com/itm4n/PPLdump
@WindowsHackingLibrary
https://blog.scrt.ch/2021/04/22/bypassing-lsa-protection-in-userland
Tool: https://github.com/itm4n/PPLdump
@WindowsHackingLibrary
GitHub
GitHub - itm4n/PPLdump: Dump the memory of a PPL with a userland exploit
Dump the memory of a PPL with a userland exploit. Contribute to itm4n/PPLdump development by creating an account on GitHub.
Abusing Replication: Stealing AD FS Secrets Over the Network
https://www.fireeye.com/blog/threat-research/2021/04/abusing-replication-stealing-adfs-secrets-over-the-network.html
@WindowsHackingLibrary
https://www.fireeye.com/blog/threat-research/2021/04/abusing-replication-stealing-adfs-secrets-over-the-network.html
@WindowsHackingLibrary
Google Cloud Blog
Abusing AD FS Replication | Stealing Secrets Over the Network | Google Cloud Blog
Abusing AD FS Replication. We demonstrate how a threat actor can extract the encrypted Token Signing Certificate from anywhere on an internal network.
Bypassing EDR real-time injection detection logic
https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
Tool: https://github.com/xinbailu/DripLoader
@WindowsHackingLibrary
https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
Tool: https://github.com/xinbailu/DripLoader
@WindowsHackingLibrary
Data Only Attack: Neutralizing EtwTi Provider
https://public.cnotools.studio/bring-your-own-vulnerable-kernel-driver-byovkd/exploits/data-only-attack-neutralizing-etwti-provider
@WindowsHackingLibrary
https://public.cnotools.studio/bring-your-own-vulnerable-kernel-driver-byovkd/exploits/data-only-attack-neutralizing-etwti-provider
@WindowsHackingLibrary
Forwarded from w0rk3r's Blue team Library (Jonhnathan Jonhnathan Jonhnathan)
Malware researchers - Beware of GetProcAddress spoofing via manipulation of PE format in memory
https://dennisbabkin.com/blog/?t=malware-researchers-beware-of-getprocaddress-spoofing
@BlueTeamLibrary
https://dennisbabkin.com/blog/?t=malware-researchers-beware-of-getprocaddress-spoofing
@BlueTeamLibrary
www.dennisbabkin.com
Deep Dive Into Windows PE Format - GetProcAddress Spoofing
Deep Dive Into Windows PE Format - GetProcAddress Spoofing - Malware researchers - Beware of GetProcAddress spoofing via manipulation of PE format in memory.
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks
https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks
@WindowsHackingLibrary
https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks
@WindowsHackingLibrary
Praetorian
How to Exploit Active Directory ACL Attack Paths Through LDAP Relaying Attacks
Overview This article describes methods by which an attacker can induce a victim user into authenticating using the NT Lan Manager (NTLM) Authentication Protocol to an attacker-controlled “Intranet” site, even in instances where that site points to an external…
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege
https://www.tiraniddo.dev/2021/05/dumping-stored-credentials-with.html
@WindowsHackingLibrary
https://www.tiraniddo.dev/2021/05/dumping-stored-credentials-with.html
@WindowsHackingLibrary
www.tiraniddo.dev
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege
I've been going through the various token privileges on Windows trying to find where they're used. One which looked interesting is SeTruste...
Primer to DInvokes Injection API and a tale of token duplication and command-line spoofing on the cheap
https://redteamer.tips/primer-to-dinvokes-injection-api-and-a-tale-of-token-duplication-and-command-line-spoofing-on-the-cheap
@WindowsHackingLibrary
https://redteamer.tips/primer-to-dinvokes-injection-api-and-a-tale-of-token-duplication-and-command-line-spoofing-on-the-cheap
@WindowsHackingLibrary
Leveraging from PE parsing technique to write x86 shellcode
https://mohamed-fakroud.gitbook.io/t3nb3w/shellcoding/leveraging-from-pe-parsing-technique-to-write-x86-shellcode
@WindowsHackingLibrary
https://mohamed-fakroud.gitbook.io/t3nb3w/shellcoding/leveraging-from-pe-parsing-technique-to-write-x86-shellcode
@WindowsHackingLibrary
mohamed-fakroud.gitbook.io
Leveraging from PE parsing technique to write x86 shellcode | Red Teaming's Dojo
The Much Misunderstood SeRelabelPrivilege
https://www.tiraniddo.dev/2021/06/the-much-misunderstood.html
@WindowsHackingLibrary
https://www.tiraniddo.dev/2021/06/the-much-misunderstood.html
@WindowsHackingLibrary
www.tiraniddo.dev
The Much Misunderstood SeRelabelPrivilege
Based on my previous blog post I recently had a conversation with a friend and well-known Windows security researcher about token privilege...
Reading Your Way Around UAC
Part 1:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-1.html
Part 2:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-2.html
Part 3:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-3.html
@WindowsHackingLibrary
Part 1:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-1.html
Part 2:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-2.html
Part 3:
https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-3.html
@WindowsHackingLibrary
www.tiraniddo.dev
Reading Your Way Around UAC (Part 1)
I'm currently in the process of trying to do some improvements to the Chrome sandbox. As part of that I'm doing updates to my Sandbox Attack...
Attacking Active Directory: 0 to 0.9
https://zer1t0.gitlab.io/posts/attacking_ad
@WindowsHackingLibrary
https://zer1t0.gitlab.io/posts/attacking_ad
@WindowsHackingLibrary
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
YouTube
Mimicking Evil, Alex Manners
Bypassing Image Load Kernel Callbacks
https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks
@WindowsHackingLibrary
https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks
@WindowsHackingLibrary
MDSec
Bypassing Image Load Kernel Callbacks - MDSec
As security teams continue to advance, it has become essential for attacker’s to have complete control over every part of their operation, from the infrastructure down to individual actions that...
Certified Pre-Owned: Abusing Active Directory Certificate Services
https://posts.specterops.io/certified-pre-owned-d95910965cd2
Paper: https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf
@WindowsHackingLibrary
https://posts.specterops.io/certified-pre-owned-d95910965cd2
Paper: https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf
@WindowsHackingLibrary
Medium
Certified Pre-Owned
Active Directory Certificate Services has a lot of attack potential!