- Security Cadence: Prevent End Users from Joining Computers to the Domain https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html 38 comments sysadmin
Linking pages
- State of Pentesting 2020 – Sec Team Blog https://blog.scrt.ch/2020/12/28/state-of-pentesting-2020/ 20 comments
- AD-Attack-Defense/README.md at master · infosecn1nja/AD-Attack-Defense · GitHub https://github.com/infosecn1nja/ad-attack-defense/blob/master/readme.md#discovery 19 comments
- Certified Pre-Owned. Active Directory Certificate Services… | by Will Schroeder | Posts By SpecterOps Team Members https://posts.specterops.io/certified-pre-owned-d95910965cd2 13 comments
- SensePost | Certpotato â using adcs to privesc from virtual and network service accounts to local system https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/ 8 comments
- Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover | by Elad Shamir | Posts By SpecterOps Team Members https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab 3 comments
- The worst of both worlds: Combining NTLM Relaying and Kerberos delegation - dirkjanm.io https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/ 0 comments
- Certified Pre-Owned. Active Directory Certificate Services… | by Will Schroeder | Posts By SpecterOps Team Members https://posts.specterops.io/certified-pre-owned-d95910965cd2?gi=86e09aca1d9e 0 comments
- GitHub - Spacial/awesome-csirt: Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities. https://github.com/Spacial/csirt 0 comments
- S4fuckMe2selfAndUAndU2proxy - A low dive into Kerberos delegations – LuemmelSec – Just an admin on someone else´s computer https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/ 0 comments
Linked pages
- Hot Potato – Windows Privilege Escalation http://foxglovesecurity.com/2016/01/16/hot-potato/ 80 comments
- Rotten Potato – Privilege Escalation from Service Accounts to SYSTEM https://foxglovesecurity.com/2016/09/26/rotten-potato-privilege-escalation-from-service-accounts-to-system/ 18 comments
- Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS https://blog.netspi.com/exploiting-adidns/ 18 comments
- KB4034879: Use the LdapEnforceChannelBinding registry entry to make LDAP authentication over SSL/TLS more secure - Microsoft Support https://support.microsoft.com/en-us/help/4034879/how-to-add-the-ldapenforcechannelbinding-registry-entry 11 comments
- http://www.harmj0y.net/blog/redteaming/not-a-security-boundary-breaking-forest-trusts/ 1 comment
- Juicy Potato (abusing the golden privileges) | juicy-potato https://ohpe.it/juicy-potato/ 0 comments
Related searches:
Search whole site: site:shenaniganslabs.io
Search title: Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory | Shenanigans Labs
See how to search.