❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Abusing S4U2Self for Active Directory Pivoting

By: BHIS
11 June 2025 at 10:00

TL;DR If you only have access to a valid machine hash, you can leverage the Kerberos S4U2Self proxy for local privilege escalation, which allows reopening and expanding potential local-to-domain pivoting paths, such as SEImpersonate!

The post Abusing S4U2Self for Active Directory Pivoting appeared first on Black Hills Information Security, Inc..

Webcast: Kerberos & Attacks 101

Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast […]

The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

A Toast to Kerberoast

By: BHIS
8 May 2017 at 12:55

Derek Banks // This post will walk through a technique to remotely run a Kerberoast attack over an established Meterpreter session to an Internet-based Ubuntu 16.04 C2 server and crack […]

The post A Toast to Kerberoast appeared first on Black Hills Information Security, Inc..

❌
❌