Our Blog

Abusing Windows’ tokens to compromise Active Directory without touching LSASS

Reading time: ~34 min
During an internal assessment, I performed an NTLM relay and ended up owning the NT AUTHORITY\SYSTEM account of the Windows...

Covert Login Alerting

Reading time: ~4 min
Intro For the longest time I had the idea to implement a notification system that would alert me if someone...