❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

More information from Microsoft about Secure Boot!

20 April 2026 at 03:42
PATCH WATCH By Susan Bradley One of my complaints on behalf of consumers is that information about the new security certificates for Secure Boot has been vague β€” nearly hidden. Unless you are an AskWoody reader, you might not even be aware that there is an issue with Secure Boot certificates β€” not to mention […]

MS-DEFCON 4: Outlook leads the pack in patching issues

24 March 2026 at 03:45
ISSUE 23.12.1 β€’ 2026-03-24 By Susan Bradley This month has been relatively quiet for Microsoft Windows updates. Sure, there are the occasional β€œwon’t install the update” situations that are usually fixed with a repair install over the top. I’ve become tired of seeing them. And there were two out-of-band updates for Windows 11 Enterprise 25H2, […]

Taming the risk of NTLM

9 February 2026 at 03:45
ISSUE 23.06 β€’ 2026-02-09 ON SECURITY By Susan Bradley Windows in business does one thing really well. It connects computers together to allow users to share information. A key to sharing is authentication. Windows has used a protocol called the New Technology LAN Manager (NTLM). Its very name is now something of an oxymoron: it […]

Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation

By: BHIS
26 November 2025 at 09:00

This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.

The post Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 2): Constrained Delegation

By: BHIS
12 November 2025 at 09:00

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.

The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 1): Unconstrained Delegation

By: BHIS
5 November 2025 at 09:00

In Active Directory exploitation, Kerberos delegation is easily among my top favorite vectors of abuse, and in the years I’ve been learning Kerberos exploitation, I’ve noticed that Impacket doesn’t get nearly as much coverage as tools like Rubeus or Mimikatz.

The post Abusing Delegation with Impacket (Part 1): Unconstrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing S4U2Self for Active Directory Pivoting

By: BHIS
11 June 2025 at 10:00

TL;DR If you only have access to a valid machine hash, you can leverage the Kerberos S4U2Self proxy for local privilege escalation, which allows reopening and expanding potential local-to-domain pivoting paths, such as SEImpersonate!

The post Abusing S4U2Self for Active Directory Pivoting appeared first on Black Hills Information Security, Inc..

Webcast: Kerberos & Attacks 101

By: BHIS
26 May 2020 at 10:02

Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast […]

The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

A Toast to Kerberoast

By: BHIS
8 May 2017 at 12:55

Derek Banks // This post will walk through a technique to remotely run a Kerberoast attack over an established Meterpreter session to an Internet-based Ubuntu 16.04 C2 server and crack […]

The post A Toast to Kerberoast appeared first on Black Hills Information Security, Inc..

❌
❌