Bypassing Image Load Kernel Callbacks
https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks
@WindowsHackingLibrary
https://www.mdsec.co.uk/2021/06/bypassing-image-load-kernel-callbacks
@WindowsHackingLibrary
MDSec
Bypassing Image Load Kernel Callbacks - MDSec
As security teams continue to advance, it has become essential for attacker’s to have complete control over every part of their operation, from the infrastructure down to individual actions that...
Certified Pre-Owned: Abusing Active Directory Certificate Services
https://posts.specterops.io/certified-pre-owned-d95910965cd2
Paper: https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf
@WindowsHackingLibrary
https://posts.specterops.io/certified-pre-owned-d95910965cd2
Paper: https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf
@WindowsHackingLibrary
Medium
Certified Pre-Owned
Active Directory Certificate Services has a lot of attack potential!
AD CS relay attack - Practical Guide
https://www.exandroid.dev/2021/06/23/ad-cs-relay-attack-practical-guide
@WindowsHackingLibrary
https://www.exandroid.dev/2021/06/23/ad-cs-relay-attack-practical-guide
@WindowsHackingLibrary
Ex Android Dev
AD CS relay attack - practical guide
Unless you are living under the rock, you have seen that recently @harmj0y and @tifkin_ published their amazing research on Active Directory Certificate Services (AD CS). If you haven’t checked it out already read their post first.
Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover
https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
@WindowsHackingLibrary
https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
@WindowsHackingLibrary
SpecterOps
The Renaissance of NTLM Relay Attacks: Everything You Need to Know - SpecterOps
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and arguably worse than ever before. Relay attacks are the easiest…
Forwarded from r0 Crew (Channel)
The new OpenSecurityTraining2 site has been launched at http://ost2.fyi The public betas of refreshed classes on x86-64 assembly, x86-64 OS internals and coreboot are now open #security #hardware #reverse #dukeBarman
Fantastic Windows Logon types and Where to Find Credentials in Them
https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them
@WindowsHackingLibrary
https://www.alteredsecurity.com/post/fantastic-windows-logon-types-and-where-to-find-credentials-in-them
@WindowsHackingLibrary
Altered Security
Fantastic Windows Logon types and Where to Find Credentials in Them
Hello All,In this blog post we will explore and learn about various Windows Logon Types and understand how are these logon type events are generated. We will also see if we can extract credentials from individual logon types. We will be using our Active Directory…
Windows Command-Line Obfuscation
https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
@WindowsHackingLibrary
https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
@WindowsHackingLibrary
www.wietzebeukema.nl
Windows Command-Line Obfuscation
Many Windows applications have multiple ways in which the same command line can be expressed, usually for compatibility or ease-of-use reasons. As a result, command-line arguments are implemented inconsistently making detecting specific commands harder due…
Hijacking DLLs in Windows
https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows
@WindowsHackingLibrary
https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows
@WindowsHackingLibrary
www.wietzebeukema.nl
Hijacking DLLs in Windows
DLL Hijacking is a popular technique for executing malicious payloads. This post lists nearly 300 executables vulnerable to relative path DLL Hijacking on Windows 10 (1909), and shows how with a few lines of VBScript some of the DLL hijacks can be executed…
Forwarded from w0rk3r's Blue team Library (Jonhnathan Jonhnathan Jonhnathan)
Cobalt Strike and Tradecraft
https://hausec.com/2021/07/26/cobalt-strike-and-tradecraft
@BlueTeamLibrary
https://hausec.com/2021/07/26/cobalt-strike-and-tradecraft
@BlueTeamLibrary
hausec
Cobalt Strike and Tradecraft
It’s been known that some built-in commands in Cobalt Strike are major op-sec no-no’s, but why are they bad? The goal of this post isn’t to teach you “good” op-sec, as I feel that is a bit subjecti…
MachineAccountQuota is USEFUL Sometimes: Exploiting One of Active Directory's Oddest Settings
https://www.netspi.com/blog/technical/network-penetration-testing/machineaccountquota-is-useful-sometimes
@WindowsHackingLibrary
https://www.netspi.com/blog/technical/network-penetration-testing/machineaccountquota-is-useful-sometimes
@WindowsHackingLibrary
NetSPI
MachineAccountQuota is USEFUL Sometimes: Exploiting One of Active Directory's Oddest Settings
Learn about what MAQ is and beyond in our blog ennoscriptd MachineAccountQuota is USEFUL Sometimes: Exploiting One of Active Directory's Oddest Settings.
Forwarded from Zer0 to her0 (Jonhnathan Jonhnathan Jonhnathan)
From Stolen Laptop to Inside the Company Network
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
@FromZer0toHero
https://dolosgroup.io/blog/2021/7/9/from-stolen-laptop-to-inside-the-company-network
@FromZer0toHero
Stealing Tokens In Kernel Mode With A Malicious Driver
https://www.solomonsklash.io/stealing-tokens-with-malicious-driver.html
@WindowsHackingLibrary
https://www.solomonsklash.io/stealing-tokens-with-malicious-driver.html
@WindowsHackingLibrary
www.solomonsklash.io
Stealing Tokens In Kernel Mode With A Malicious Driver - SolomonSklash.io
Writing a malicious driver to steal tokens from kernel mode.
Certified Pre-Owned: Abusing Active Directory Certificate Services (Slides)
https://www.slideshare.net/harmj0y/certified-preowned-249927533
@WindowsHackingLibrary
https://www.slideshare.net/harmj0y/certified-preowned-249927533
@WindowsHackingLibrary
SlideShare
Certified Pre-Owned
Certified Pre-Owned - Download as a PDF or view online for free
w0rk3r's Windows Hacking Library
Certified Pre-Owned: Abusing Active Directory Certificate Services (Slides) https://www.slideshare.net/harmj0y/certified-preowned-249927533 @WindowsHackingLibrary
ForgeCert: "ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for arbitrary users capable of authentication to Active Directory."
https://github.com/GhostPack/ForgeCert
@WindowsHackingLibrary
https://github.com/GhostPack/ForgeCert
@WindowsHackingLibrary
GitHub
GitHub - GhostPack/ForgeCert: "Golden" certificates
"Golden" certificates. Contribute to GhostPack/ForgeCert development by creating an account on GitHub.
Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server
Orange Tsai at DEFCON 29
https://www.youtube.com/watch?v=5mqid-7zp8k
@SecTalks
Orange Tsai at DEFCON 29
https://www.youtube.com/watch?v=5mqid-7zp8k
@SecTalks
YouTube
DEF CON 29 - Orange Tsai - ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server
Microsoft Exchange Server is an email solution widely deployed within government and enterprises, and it is an integral part of both their daily operations and security. Needless to say, vulnerabilities in Exchange have long been the Holy Grail for attackers…
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html
@WindowsHackingLibrary
https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html
@WindowsHackingLibrary
Orange Tsai
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
The series of A New Attack Surface on MS Exchange: A New Attack Surface on MS Exchange Part 1 - ProxyLogon! A New Attack Surface on MS Exchange Part 2 - ProxyOracle! A New Attack Surface on MS Excha
w0rk3r's Windows Hacking Library
A New Attack Surface on MS Exchange Part 1 - ProxyLogon! https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html @WindowsHackingLibrary
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html
@WindowsHackingLibrary
https://blog.orange.tw/2021/08/proxyoracle-a-new-attack-surface-on-ms-exchange-part-2.html
@WindowsHackingLibrary
Orange Tsai
A New Attack Surface on MS Exchange Part 2 - ProxyOracle!
Hi, this is the part 2 of the New MS Exchange Attack Surface. Because this article refers to several architecture introductions and attack surface concepts in the previous article, you could find the
Breaking Typical Windows Hardening Implementations
https://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations
@WindowsHackingLibrary
https://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations
@WindowsHackingLibrary
TrustedSec
Breaking Typical Windows Hardening Implementations
In this post, I will go over some hardening configurations that are typically set in Group Policy settings and ways to bypass them. General methods for…
The dying knight in the shiny armour: Killing Defender through NT symbolic links redirection while keeping it unbothered
https://aptw.tf/2021/08/21/killing-defender.html
@WindowsHackingLibrary
https://aptw.tf/2021/08/21/killing-defender.html
@WindowsHackingLibrary