-
Image File Execution Options
What is is Image File Execution Options (IFEO) is a feature in Windows that allows administrators to control the execution of specific executable files. IFEO provides a way to specify…
-
Kerberos Delegation Attacks (part2)
In a previous blog post, we discussed Kerberos Delegation Attacks. We briefly explained the different attack types, compared them, and finally attacked the Constrained Delegation type. In this blog post,…
-
Kerberos Delegation Attacks (part1)
Kerberos Constrained Delegation is a powerful security feature in Microsoft’s Active Directory that enables a service to act on behalf of a user and securely access resources. This advanced capability…
-
AS-REP Roasting: A Recipe for Kerberos Credential Theft
AS-REP Roasting attacks are credential theft attacks that target the Kerberos authentication protocol in Microsoft Active Directory environments. The attack exploits a vulnerability in how Kerberos handles authentication requests, allowing…
-
Kerberoasting – attacking the three-headed dog
When people log into computers, they typically do so by entering a password. However, the problem with this method is that if someone gets hold of the password, they can…
-
Monitor the keys to the kingdom
Why and How to Monitor NTDS.DIT, System Hive, and SAM File in Windows In my previous blog post, I talked about the NTDS.DIT, the System Hive, and the SAM file.…
-
NTDS.DIT, the System Hive, and the SAM File in Windows
The Windows operating system relies on various files and databases to securely manage critical system information and user accounts. The NTDS, DIT, System Hive, and the SAM file are three…
-
Abusing Group Policy Objects
In a previous post, we discussed about Active Directory ACL/ACE and how to abuse them. Now we will see how to abuse Active Directory’s GPOs What is Group Policy Objects…
-
Abusing Active Directory ACL/ACE
Access to Active Directory Domain Services resources is typically given through what’s known as an Access Control Entry (ACE). DACLs (Active Directory Discretionary Access Control Lists) are ACEs (Access Control…