The Woodlands, TX
Joined July 2017
Check out my latest research "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory" New attack techniques and live 0days inside. MSRC’s response: "this is not an issue which will be addressed via a security update" shenaniganslabs.io/2019/01/2…
17
357
11
600
I usually avoid this kind of stuff, but I’ll make an exception naming and shaming this time. This is a complete rip off of a presentation I spent a lot of time and effort putting together back in 2019. Shame on you @sensepost and @AwesomeFox7
This tweet is unavailable
4
2
14
The original slide deck is available here: shenaniganslabs.io/media/Con…
1
2
1
21
My teammate Matt Johnson (@breakfix) published a new post about his brilliant Airstrike Attack (CVE-2021-28316), allowing for FDE bypass and EoP on domain-joined Windows workstations. MSRC has just released a patch. Check it out at shenaniganslabs.io/2021/04/1…
Check out my latest blog post detailing the "Airstrike Attack" allowing for FDE bypass and EoP on domain joined Windows workstations (CVE 2021-28316) shenaniganslabs.io/2021/04/1…
1
6
1
15
As always, amazing work, Chris.
After months of research, here's my deep dive into post-exploit tactics and techniques for Google Cloud Platform. I hope you find it helpful!
Very clever attack by @danyaldrew, who managed to bypass the mitigations by exploiting a simple yet elusive design flaw. Good job, Dan!
NTLM reflection is back to haunt windows. Read about Ghost Potato here (this time with a fixed link): shenaniganslabs.io/2019/11/1…
1
1
8
Just in time for our @defcon workshop about Kerberos delegation, MSRC failed to meet the disclosure deadline, and we publicly disclose another primitive to achieve LPE on domain-joined Windows hosts. shenaniganslabs.io/2019/08/0…
4
216
7
356
Myself and @3xocyte will be teaching a workshop on Kerberos delegation at @defcon. We will cover everything from Kerberos 101, through the classic delegation attacks, to the latest attack chains. Join us for an entertaining presentation and hands-on labs. eventbrite.com/e/constructin…
1
6
2
29
The @SpecterOps Adversary Tactics: Detection course in Brisbane was a blast. I learned a lot, had great discussions about detection, evasion and ideas for new techniques. Meeting @robwinchester3, @Cyb3rWard0g, and @rrcyrus was a pleasure. I hope to see you again soon. Thank you!
1
4
25
For those that missed it, resource-based constrained delegation can be abused for LPE on Windows 10 with default configuration and on Windows 2016/2019 with WebDAV Redirector. Details: shenaniganslabs.io/2019/01/2… Short demo: inv.warpnine.de/741uz0ILxCA
2
57
111
Check out my latest research "Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory" New attack techniques and live 0days inside. MSRC’s response: "this is not an issue which will be addressed via a security update" shenaniganslabs.io/2019/01/2…
17
357
11
600
Thanks to @harmj0y @bluscreenofjeff @brian_psu @001SPARTaN for awesome training, and upskilling @TML_au's red team.
3
14
Show this thread