- Shadow Credentials: Abusing Key Trust Account Mapping for Takeover https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab 3 comments netsec
Linking pages
- GitHub - Dec0ne/KrbRelayUp: KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings). https://github.com/Dec0ne/KrbRelayUp 19 comments
- I’m bringing relaying back: A comprehensive guide on relaying anno 2022 - TrustedSec https://www.trustedsec.com/blog/a-comprehensive-guide-on-relaying-anno-2022/?hss_channel=tw-403811306 13 comments
- SensePost | Certpotato â using adcs to privesc from virtual and network service accounts to local system https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/ 8 comments
- GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse https://github.com/ollypwn/Certipy 7 comments
- Certipy 2.0: BloodHound, New Escalations, Shadow Credentials, Golden Certificates, and more! | by Oliver Lyak | IFCR https://research.ifcr.dk/certipy-2-0-bloodhound-new-escalations-shadow-credentials-golden-certificates-and-more-34d1c26f0dc6 5 comments
- GitHub - ly4k/Certipy: Tool for Active Directory Certificate Services enumeration and abuse https://github.com/ly4k/Certipy 0 comments
- Shadow Credentials – Penetration Testing Lab https://pentestlab.blog/2022/02/07/shadow-credentials/ 0 comments
Linked pages
- Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory | Shenanigans Labs https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html 38 comments
- Medium https://medium.com/m/signin?isDraft=1&operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40jamie_34747%2F79d382edf22b%3Fsource%3D 19 comments
- GitHub - MichaelGrafnetter/DSInternals: Directory Services Internals (DSInternals) PowerShell Module and Framework https://github.com/MichaelGrafnetter/DSInternals 0 comments
Related searches:
Search whole site: site:posts.specterops.io
Search title: Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover | by Elad Shamir | Posts By SpecterOps Team Members
See how to search.