Check out my latest research "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory"
New attack techniques and live 0days inside.
MSRC’s response: "this is not an issue which will be addressed via a security update"
shenaniganslabs.io/2019/01/2…
Have you ever wondered how RODCs work and whether compromising one would necessarily allow for privilege escalation?
The answers are in my new post:
At the Edge of Tier Zero: The Curious Case of the RODC
posts.specterops.io/at-the-e…
GMSA passwords aren’t what you think.
Read all about it in @YuG0rd’s post, where he dives into how gMSA passwords are generated and introduces the Golden GMSA attack.
semperis.com/blog/golden-gms…
I usually avoid this kind of stuff, but I’ll make an exception naming and shaming this time.
This is a complete rip off of a presentation I spent a lot of time and effort putting together back in 2019.
Shame on you @sensepost and @AwesomeFox7
I just published my first @SpecterOps post about Shadow Credentials - an alternative technique for taking over user and computer objects in AD.
Check it out:
posts.specterops.io/shadow-c…
My teammate Matt Johnson (@breakfix) published a new post about his brilliant Airstrike Attack (CVE-2021-28316), allowing for FDE bypass and EoP on domain-joined Windows workstations.
MSRC has just released a patch.
Check it out at shenaniganslabs.io/2021/04/1…
Check out my latest blog post detailing the "Airstrike Attack" allowing for FDE bypass and EoP on domain joined Windows workstations (CVE 2021-28316) shenaniganslabs.io/2021/04/1…
Need to traverse security zones?
In this new post, I share a trick for establishing peer-to-peer C2 over DNS with ADIDNS.
shenaniganslabs.io/2020/04/1…
NTLM reflection is back to haunt Windows.
@danyaldrew bypassed the mitigations with a simple yet elusive design flaw.
Read all about Ghost Potato in our latest post:
shenaniganslabs.io/2019/11/1…
We just finished delivering our @defcon workshop about Kerberos delegation attacks. As promised, here's the slide deck for those that couldn't attend:
shenaniganslabs.io/2019/08/0…
Just in time for our @defcon workshop about Kerberos delegation, MSRC failed to meet the disclosure deadline, and we publicly disclose another primitive to achieve LPE on domain-joined Windows hosts.
shenaniganslabs.io/2019/08/0…
Myself and @3xocyte will be teaching a workshop on Kerberos delegation at @defcon. We will cover everything from Kerberos 101, through the classic delegation attacks, to the latest attack chains. Join us for an entertaining presentation and hands-on labs.
eventbrite.com/e/constructin…
My teammate Chris Moberly (@init_string) strikes again with another Linux LPE, a very clever exploit, and an awesome write-up.
shenaniganslabs.io/2019/05/2…
Brilliant work, Chris!
A new way to exploit LXD for Linux privilege escalation: relaying UNIX socket credentials to speak directly to systemd. Hope you enjoy!
shenaniganslabs.io/2019/05/2…
The @SpecterOps Adversary Tactics: Detection course in Brisbane was a blast. I learned a lot, had great discussions about detection, evasion and ideas for new techniques. Meeting @robwinchester3, @Cyb3rWard0g, and @rrcyrus was a pleasure. I hope to see you again soon. Thank you!
My teammate Chris Moberly (@init_string) just dropped a beautiful LPE on stock Ubuntu and derivatives - “dirty_sock”
shenaniganslabs.io/2019/02/1…
Nice work, Chris!
For those that missed it, resource-based constrained delegation can be abused for LPE on Windows 10 with default configuration and on Windows 2016/2019 with WebDAV Redirector.
Details: shenaniganslabs.io/2019/01/2…
Short demo: inv.warpnine.de/741uz0ILxCA
Check out my latest research "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory"
New attack techniques and live 0days inside.
MSRC’s response: "this is not an issue which will be addressed via a security update"
shenaniganslabs.io/2019/01/2…