|
You are here |
adsecurity.org | ||
| | | | |
shenaniganslabs.io
|
|
| | | | | By default, domain joined Windows workstations allow access to the network selection UI from the lock screen. An attacker with physical access to a locked device with WiFi capabilities (such as a laptop or a workstation) can abuse this functionality to force the laptop to authenticate against a rogue access point and capture a MSCHAPv2 challenge response hash for the domain computer account. This challenge response hash can then be submitted to crack.sh to recover the NTLM hash of the computer account in less than 24 hours. Once recovered, this NTLM hash combined with the domain SID can be used to forge Kerberos silver tickets to impersonate a privileged user and compromise the host. An example of this is to create a silver ticket for the CIFS service of the... | |
| | | | |
www.bloggingforlogging.com
|
|
| | | | | One of the most common problems I come across today when it comes to remotely managing Windows is dealing with WinRM and its inconsistencies. I wanted to create a blog post that will help people un... | |
| | | | |
www.securitynik.com
|
|
| | | | | In this post, I'm learning about Kerberos and one of its attacks. Specifically, I'm learning about Authentication Service Response (AS-REP) ... | |
| | | | |
www.runzero.com
|
|
| | | [AI summary] A critical vulnerability in Palo Alto Networks' PAN-OS software (CVE-2024-3400) allows remote code execution, with guidance on identifying affected systems and mitigating risks using runZero's tools. | ||