HackAndDo's profile picture. Active Directory curious ♥

Pixis

@HackAndDo

Active Directory curious ♥

Pixis reposted

See your network shares the way attackers do. 👀 Meet ShareHound, an OpenGraph collector for BloodHound CE & Enterprise that reveals share-level attack paths at scale. @podalirius_ unpacks all the details in our latest blog post. ghst.ly/4ogiBqt


Pixis reposted

Think your Active Directory has “a few” service accounts? Think again. I wrote a super quick blog post on discovering (potential) service accounts via a PS script, how to clean them up, and some monitoring best practices when admins are misusing them. medium.com/@Debugger/we-h…


Article super intéressant sur les silos d'authentification Windows 👊

Un administrateur local sur une machine compromise peut extraire les secrets d’authentification stockés dans LSASS et, potentiellement, compromettre tout le domaine. 👉 Les silos d’authentification AD offrent une réponse efficace 📖 blog.login-securite.com/les-silos-daut…



Pixis reposted

Come to see how we discovered and analyzed CVE-2025-33073 with my colleague @yaumn_ at Hexacon today !

📢 NTLM reflection is dead, long live NTLM reflection: Story of an accidental Windows RCE by Wil (@wil_fri3d)

hexacon_fr's tweet image. 📢 NTLM reflection is dead, long live NTLM reflection: Story of an accidental Windows RCE by Wil (@wil_fri3d)


Pixis reposted

Update on the NTLM reflection attack: ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡 Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability! 1/4🧵

al3x_n3ff's tweet image. Update on the NTLM reflection attack:
ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡

Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability!
1/4🧵

Pixis reposted

Huitième rump: "It's RPC time!" par @Rauxam_


Pixis reposted

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


A detailed description of the R&D process with its ups and downs, a great deep dive into Windows internals to try to remotely enable the Web Client service. Great work 👏

Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service remotely as a low-privileged user. @0xthirteen breaks down the service startup mechanics, plus the protocols and technologies. ghst.ly/41QT7GW



Pixis reposted

Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service remotely as a low-privileged user. @0xthirteen breaks down the service startup mechanics, plus the protocols and technologies. ghst.ly/41QT7GW


Pixis reposted

If you want to quickly check whether the guest account is enabled, you can now do it with NetExec. This is not enabled by default you need to set the custom flag check_guest_account in your nxc.conf file. Maybe one day it will be set to true by default 🪂

mpgn_x64's tweet image. If you want to quickly check whether the guest account is enabled, you can now do it with NetExec. This is not enabled by default you need to set the custom flag check_guest_account in your nxc.conf file. Maybe one day it will be set to true by default 🪂

Pixis reposted

gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP… It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.


Pixis reposted

You didn’t click, but your password challenge is leaked. I’m excited to share my latest research: CVE-2025-50154, a high severity NTLM hash disclosure vulnerability in the explorer.exe process, exploitable without any user interaction. cymulate.com/blog/zero-clic…


Pixis reposted

Session enumeration is only possible with admin privileges? That is a problem of the past thanks to the new --reg-sessions core functionality of NetExec, made by @toffyrak🔥

al3x_n3ff's tweet image. Session enumeration is only possible with admin privileges? That is a problem of the past thanks to the new --reg-sessions core functionality of NetExec, made by @toffyrak🔥

Pixis reposted

Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment. Your own hands-on Entra lab for identity attack simulation. Built for red teams, blue teams and identity nerds. Check it out here👉github.com/semperis/entra…

TomerNahum1's tweet image. Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment.

Your own hands-on Entra lab for identity attack simulation.

Built for red teams, blue teams and identity nerds. 

Check it out here👉github.com/semperis/entra…

Pixis reposted

Added a small Quality of Life improvement to NetExec: When the target allows null authentication the host banner automatically displays this info now🚀

al3x_n3ff's tweet image. Added a small Quality of Life improvement to NetExec: 

When the target allows null authentication the host banner automatically displays this info now🚀

Pixis reposted

In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound: specterops.io/blog/2025/08/0…


Pixis reposted

hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…

hashcat's tweet image. hashcat v7.0.0 released! 

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. 

Detailed writeup is available here: hashcat.net/forum/thread-1…

Pixis reposted

It's been almost a year since my last blog... So, here is a new one: Extending AD CS attack surface to the cloud with Intune certificates. Also includes ESC1 over Intune (in some cases). dirkjanm.io/extending-ad-c… Oh, and a new tool for SCEP: github.com/dirkjanm/scepr…


Pixis reposted

To trigger local SYSTEM authentication for relaying to ADCS or LDAP for LPE you would usually need the printer service or EFS service to be enabled (printerbug/petitpotam). Here is an alternative without this requirement 🤠 github.com/rtecCyberSec/R…

ShitSecure's tweet image. To trigger local SYSTEM authentication for relaying to ADCS or LDAP for LPE you would usually need the printer service or EFS service to be enabled (printerbug/petitpotam). Here is an alternative without this requirement 🤠

github.com/rtecCyberSec/R…

Pixis reposted

Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb ! Evilginx is really nice to setup custom phishing campaign whatever the environment is... Phishlet available here : github.com/OtterHacker/Ok…


Loading...

Something went wrong.


Something went wrong.