Normal view
MS-DEFCON 4: Outlook leads the pack in patching issues
Taming the risk of NTLM
-
Black Hills Information Security
- Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation
![]()
This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.
The post Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation appeared first on Black Hills Information Security, Inc..
Abusing Delegation with Impacket (Part 2): Constrained Delegation
![]()
This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.
The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
![]()
In Active Directory exploitation, Kerberos delegation is easily among my top favorite vectors of abuse, and in the years Iβve been learning Kerberos exploitation, Iβve noticed that Impacket doesnβt get nearly as much coverage as tools like Rubeus or Mimikatz.
The post Abusing Delegation with Impacket (Part 1): Unconstrained Delegation appeared first on Black Hills Information Security, Inc..
Abusing S4U2Self for Active Directory Pivoting
![]()
TL;DR If you only have access to a valid machine hash, you can leverage the Kerberos S4U2Self proxy for local privilege escalation, which allows reopening and expanding potential local-to-domain pivoting paths, such as SEImpersonate!
The post Abusing S4U2Self for Active Directory Pivoting appeared first on Black Hills Information Security, Inc..
Webcast: Kerberos & Attacks 101
![]()
Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 Weβre really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast [β¦]
The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security, Inc..
Webcast: Group Policies That Kill Kill Chains
![]()
On this webcast, weβll guide you through an iterative process of building and deploying effective and practical Group Policy Objects (GPOs) that increase security posture. Slides for this webcast can [β¦]
The post Webcast: Group Policies That Kill Kill Chains appeared first on Black Hills Information Security, Inc..
A Toast to Kerberoast
![]()
Derek Banks // This post will walk through a technique to remotely run a Kerberoast attack over an established Meterpreter session to an Internet-based Ubuntu 16.04 C2 server and crack [β¦]
The post A Toast to Kerberoast appeared first on Black Hills Information Security, Inc..
-
Black Hills Information Security
- Whatβs trust among schoolchildren: Kerberos Authentication Explained
Whatβs trust among schoolchildren: Kerberos Authentication Explained
Logan Lembke // Kerberos authentication can be daunting but is an important protocol to understand for any IT professional, and especially important in the field of information security. While you [β¦]
The post Whatβs trust among schoolchildren: Kerberos Authentication Explained appeared first on Black Hills Information Security, Inc..