HackmichNet's profile picture. Windows security novice ... Always try to learn something new ... Happy hacking

Constantin

@HackmichNet

Windows security novice ... Always try to learn something new ... Happy hacking

Constantin reposted

The Azure AD Broker plays a key role in Entra ID sign-in & token handling, but how well do we really understand it? @winternl_t unpacks its on-disk cache, how to decode it, & the security implications. 🔐 ghst.ly/4oTR4v5


Constantin reposted

Check out our new blog post on instrumentation callbacks (ICs). In this first part of this blog series, we’re discussing an undocumented feature of Windows: instrumentation callbacks (ICs). You will learn how ICs are implemented and how you can use them to log and spoof syscalls…

cirosec's tweet image. Check out our new blog post on instrumentation callbacks (ICs).

In this first part of this blog series, we’re discussing an undocumented feature of Windows: instrumentation callbacks (ICs). You will learn how ICs are implemented and how you can use them to log and spoof syscalls…

Constantin reposted

KrbRelayEx: Manipulating DNS entries to take over the Domain GitHub: github.com/decoder-it/Krb… KrbRelayEx is a program that intercepts and forwards Kerberos authentication requests (AP-REQ tickets) to carry out man-in-the-middle attacks.

DarkWebInformer's tweet image. KrbRelayEx: Manipulating DNS entries to take over the Domain

GitHub: github.com/decoder-it/Krb…

KrbRelayEx is a program that intercepts and forwards Kerberos authentication requests (AP-REQ tickets) to carry out man-in-the-middle attacks.

Constantin reposted

New Titanis release => github.com/trustedsec/Tit… Mostly Kerberos enhancements: - S4U2self and S4U2proxy - Change/Set password - Generate crypto key on command line ASN.1 saw some major changes to pave the way for some upcoming enhancements


Constantin reposted

ADCSDevilCOM 📍 A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB…


Constantin reposted

Today, I am releasing the COM-Fuzzer. Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. github.com/warpnet/COM-Fu…


Constantin reposted

AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ ghst.ly/3Lpmjzv


Constantin reposted

I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 specterops.io/blog/2025/10/3…


Constantin reposted

Tools such as PsExec.py from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create…


Constantin reposted

Forget common backdoors — a DLL hijack in Windows Narrator can grant SYSTEM-level persistence at login. In our new blog, @Oddvarmoe shows how attackers abuse accessibility features and what defenders should monitor. Read now! trustedsec.com/blog/hack-cess…


Constantin reposted

Raw NTFS parsing for SAM/SYSTEM/NTDS.dit access? github.com/kfallahi/Under… 400 lines Powershell - easy peasy ❤️🔥

ShitSecure's tweet image. Raw NTFS parsing for SAM/SYSTEM/NTDS.dit access?

github.com/kfallahi/Under…

400 lines Powershell - easy peasy ❤️🔥

Constantin reposted

NTLM Password Changer - A PowerShell utility that changes Windows account passwords through the native Samlib.dll API, the same low-level library used by Windows itself for SAM and NTLM account management. github.com/kfallahi/NTLMP…


Constantin reposted

Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: github.com/bohops/COM-to-… Recording should be released soon.


Constantin reposted

BYOVD to the next level (part 1). exploiting a vulnerable driver (CVE-2025-8061) TLDR; This blog post is about how to abuse a vulnerable driver to gain access to Ring-0 capabilities. blog.quarkslab.com/exploiting-len…

5mukx's tweet image. BYOVD to the next level (part 1). exploiting a vulnerable driver (CVE-2025-8061)

TLDR; This blog post is about how to abuse a vulnerable driver to gain access to Ring-0 capabilities.

blog.quarkslab.com/exploiting-len…

Constantin reposted

Ever wanted to exhaustively list every ACE your user has on AD objects? Well, it’s now possible with DACLSearch. Whether for security research or making sure you didn't miss an interesting ACE, this tool is for you. 🔗 Repo link : github.com/cogiceo/DACLSe…


Constantin reposted

Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm


Loading...

Something went wrong.


Something went wrong.