Reading time:
~9 min
Posted
by aurelien.chalot@orangecyberdefense.com
on
18 April 2024
If you have been doing internal assessments on Active Directory infrastructure you may have heard the following words: “Null session”,...
Reading time:
~18 min
Posted
by Sergio Lazaro
on
18 May 2022
The abuse of constrained delegation configuration, whereby a compromised domain user or computer account configured with constrained delegation can be...
Reading time:
~8 min
Posted
by Paul van der Haas
on
19 August 2020
Background Are you tired of working from home due to COVID? While this is quite a unique situation we find...
Reading time:
~20 min
Posted
by Justin Perdok
on
24 July 2020
tl;dr: In this writeup I am going to describe how to abuse a GenericWrite ACE misconfiguration in Active Directory to...
Reading time:
~10 min
Posted
by Hector Cuesta
on
26 March 2020
Introduction Recently, I encountered a fully password-less environment. Every employee in this company had their own smart card that they...
Reading time:
~27 min
Posted
by Sergio Lazaro
on
09 March 2020
Intro In this blog post I want to show a simulation of a real-world Resource Based Constrained Delegation attack scenario...
Reading time:
~23 min
Posted
by Reino Mostert
on
11 May 2018
Hello, TLDR; I think I found three new ways to do user enumeration on Windows domain controllers, and I wrote...
Reading time:
~6 min
Posted
by Dane Goodwin
on
07 December 2015
Given the prevalence of Microsoft Active Directory domains as the primary means of managing large corporate networks both globally and...