- Achieve RCE or lateral movement by abusing WSUS to perform NTLM relay attacks https://www.gosecure.net/blog/2021/11/22/gosecure-investigates-abusing-windows-server-update-services-wsus-to-enable-ntlm-relaying-attacks/ 6 comments netsec
Linked pages
- Hot Potato – Windows Privilege Escalation http://foxglovesecurity.com/2016/01/16/hot-potato/ 80 comments
- Overview of Server Message Block signing - Windows Server | Microsoft Learn https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing 12 comments
- GitHub - fortra/impacket: Impacket is a collection of Python classes for working with network protocols. https://github.com/SecureAuthCorp/impacket 11 comments
- The worst of both worlds: Combining NTLM Relaying and Kerberos delegation - dirkjanm.io https://dirkjanm.io/worst-of-both-worlds-ntlm-relaying-and-kerberos-delegation/ 0 comments
- Relaying credentials everywhere with ntlmrelayx – Fox-IT International blog https://blog.fox-it.com/2017/05/09/relaying-credentials-everywhere-with-ntlmrelayx/ 0 comments
Related searches:
Search whole site: site:www.gosecure.net
Search title: GoSecure Investigates Abusing Windows Server Update Services (WSUS) to Enable NTLM Relaying Attacks - GoSecure
See how to search.