7MS #720: Tales of Pentest Pwnage – Part 84

7MS #720: Tales of Pentest Pwnage – Part 84

Hey friends! Today's another Tales of Pentest Pwnage!

Quick tangent first on a couple side projects: I've got a music thing at quack.house (like the duck noise, not the drug) and a podcast with my dancer son Atticus at DadOfADancer.com. Speaking of Atticus — he just landed a spot in Master Ballet Academy's summer program in Phoenix, and I am a very proud dance dad over here.

OK, on to the pentest:

  • A weird runas quirk: If your AD test account password ends in a percent sign, runas seems to misbehave (Claude thinks Windows is interpreting the % as a variable delimiter). Workaround: runascs.exe, which wraps your tool launch with creds inline. Worked like a champ — notes over on the 7MinSec.wiki.
  • Standard first pass: PingCastle for the AD overview, then Snaffler for share crawling, with Chimas as a nicer web UI for searching the Snaffler JSON.
  • The "Snaffler missed something" moment: Snaffler is great but it primarily uses pattern matching, so manual review of interesting directories still matters. I found a PowerShell script with a funky obfuscation routine, fed it to Claude for context, tracked down the function definition, and ended up decrypting a local admin password.
  • Going loud: SMB-sprayed that cred across the subnets → handful of machines popped → ran a deeper, targeted Snaffler against just those boxes → enumerated sessions and spotted a domain admin interactively logged in.
  • Plan A fizzled: Wanted to pull off a favorite trick — sneak in via WinRM and queue a scheduled task as the logged-in DA (no password needed). WinRM was disabled. Oh fart.
  • Plan B — the "trap" file: Dropped a malicious .library-ms file directly into the DA's desktop folder. No clicks required — just the desktop being open is enough to trigger an HTTP coercion to my evil box. (Caveat: I think you need a DNS record or computer object that the victim box trusts as "intranet zone.")
  • The escalation: Had ntlmrelayx standing by, ready to relay to LDAP on a DC. The coerced auth fired the moment the "trap" file landed on disk. An interactive LDAP shell fired in the DA's context, and I used it to add my low-priv account to the Domain Admins group.
  • Defense angles: Rather than chase each technique individually (LDAP signing, web client GPOs, library-ms neutralization, etc.), I like to back up to the systemic fixes that break the chain earlier. Big ones here: deploy LAPS so a single decrypted local admin password isn't a master key everywhere, and a thorough sweep for sensitive data and custom obfuscation routines hanging out on shares.

Got thoughts on any of this? Shoot 'em over — I always love hearing how you'd have tackled things differently.

Avsnitt(720)

7MS #624: Tales of Pentest Pwnage – Part 57

7MS #624: Tales of Pentest Pwnage – Part 57

Today's tale of pentest pwnage is all about my new favorite attack called SPN-less RBCD. We did a teaser episode last week that actually ended up being a full episode all about the attack, and even st...

17 Maj 202429min

7MS #623: Prelude to a Tale of Pentest Pwnage

7MS #623: Prelude to a Tale of Pentest Pwnage

Today's prelude to a tale of pentest pwnage talks about something called "spnless RBCD" (resource-based constrained delegation). The show notes don't format well here in the podcast notes, so head to...

10 Maj 202424min

7MS #622: Migrating from vCenter to Proxmox - Part 1

7MS #622: Migrating from vCenter to Proxmox - Part 1

Sadly, the Broadcom acquisition of VMWare has hit 7MinSec hard – we love running ESXi on our NUCs, but ESXi free is no longer available. To add insult to injury, our vCenter lab at OVHcloud HQ got a ...

5 Maj 202416min

7MS #621: Eating the Security Dog Food - Part 6

7MS #621: Eating the Security Dog Food - Part 6

Today we revisit a series about eating the security dog food – in other words, practicing what we preach as security gurus! Specifically we talk about: We're going to get a third-party assessment on...

26 Apr 202423min

7MS #620: Securing Your Mental Health - Part 5

7MS #620: Securing Your Mental Health - Part 5

Today we're talking about tips to deal with stress and anxiety: It sounds basic, but take breaks – and take them in a different place (don't just stay in the office and do more screen/doom-scrolling)...

21 Apr 202422min

7MS #619: Tales of Pentest Pwnage – Part 56

7MS #619: Tales of Pentest Pwnage – Part 56

We did something crazy today and recorded an episode that was 7 minutes long! Today we talk about some things that have helped us out in recent pentests: When using Farmer to create "trap" files tha...

14 Apr 20247min

7MS #618: Writing Savage Pentest Reports with Sysreptor

7MS #618: Writing Savage Pentest Reports with Sysreptor

Today's episode is all about writing reports in Sysreptor. It's awesome! Main takeaways: The price is free (they have a paid version as well)! You can send findings and artifacts directly to the re...

5 Apr 202438min

7MS #617: Tales of Pentest Pwnage – Part 55

7MS #617: Tales of Pentest Pwnage – Part 55

Hey friends, today we've got a tale of pentest pwnage that covers: Passwords – make sure to look for patterns such as keyboard walks, as well as people who are picking passwords where the month the p...

29 Mars 202436min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
politiken
aftonbladet-daily
rss-krimstad
svenska-fall
spar
flashback-forever
rss-expressen-dok
rss-krimreportrarna
kungligt
rss-sanning-konsekvens
rss-vad-fan-hande
ett-rent-noje
rss-frandfors-horna
motiv
rss-flodet
blenda-2
krimmagasinet
svd-ledarredaktionen