From NTLM relay to Kerberos relay: Everything you need to know

While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and practical insights into how these attacks work and how they differ from NTLM based relays. If you've been following my posts , tweets…

Changing Windows Passwords in the Most Complex Way

Why write a post about changing Windows passwords programmatically when so many built-in and third-party tools already let us do it effortlessly? The answer is simple: curiosity. It drives us to understand the underlying mechanisms of the systems we interact with, explore hidden parts, and sometimes even uncover unintended behaviors or security flaws. This post…

The (Almost) Forgotten Vulnerable Driver

Vulnerable Windows drivers remain one of the most exploited methods attackers use to gain access to the Windows kernel. The list of known vulnerable drivers seems almost endless, with some not even blocked by AV/EDR solutions or included in Microsoft's Driver Block List. Some time ago, I revisited an old post of mine about creating…

Group Policy Security Nightmares pt2

In this second super short post, I want to explore an unusual Group Policy Object (GPO) configuration I recently encountered. The GPO in question used a File Preference policy to copy a custom HOSTS file from a remote share to the local machine's HOSTS file: This caught my attention because it introduced an unexpected element…

Group Policy Security Nightmares pt 1

In the realm of IT administration, Group Policies serve as a powerful tool for centrally managing and controlling various aspects of an Active Directory network environment in a Windows-based operating system. They provide a way to enforce consistent settings and configurations across multiple computers and user accounts within a domain or organizational unit. In this…

The “Fake” Potato

While exploring the DCOM objects for the "SilverPotato" abuse, I stumbled upon the "ShellWindows" DCOM application. This, along with "ShellBrowserWindows", is well-known in the offensive security community for performing lateral movements by instantiating these objects remotely with admin privileges. However, I was curious to understand if they could be abused locally by a standard user.…

Abusing the SeRelabelPrivilege

In a recent assessment, it was found that a specific Group Poilcy granted via "User Right Assignments" the SeRelabelPrivilege to the built-in Users group and was applied on several computer accounts. I never found this privilege before and was obviously curious to understand the potential implications and the possibility of any (mis)usage scenario. Microsoft documentation…

Hello: I’m your Domain Admin and I want to authenticate against you

TL;DR (really?): Members of Distributed COM Users or Performance Log Users Groups can trigger from remote and relay the authentication of users connected on the target server, including Domain Controllers. #SilverPotato Remember my previous article? My insatiable curiosity led me to explore the default DCOM permissions on Domain Controllers during a quiet evening... Using some…