Coercing the domain controller machine account to authenticate to a host which is under the control of a threat actor could lead to domain compromise. The most notable technique which involves coerced authentication is the PetitPotam attack which uses the Encrypting File System Remote Protocol (MS-EFSR). However, this is not the only protocol which could be utilized for domain escalation. Awareness of alternative protocols which could be abused might give an edge to red team operators since blue teams might not have implemented a strategy to prevent domain escalations from various protocols.
POC:https://github.com/ShutdownRepo/ShadowCoerce
тех анализ: https://pentestlaboratories.com/2022/01/11/shadowcoerce/
POC:https://github.com/ShutdownRepo/ShadowCoerce
тех анализ: https://pentestlaboratories.com/2022/01/11/shadowcoerce/