• XSS.stack #1 – первый литературный журнал от юзеров форума

Remote ShadowCoerce MS-FSRVP

ibenji

(L3) cache
Пользователь
Регистрация
18.06.2019
Сообщения
154
Реакции
79
Coercing the domain controller machine account to authenticate to a host which is under the control of a threat actor could lead to domain compromise. The most notable technique which involves coerced authentication is the PetitPotam attack which uses the Encrypting File System Remote Protocol (MS-EFSR). However, this is not the only protocol which could be utilized for domain escalation. Awareness of alternative protocols which could be abused might give an edge to red team operators since blue teams might not have implemented a strategy to prevent domain escalations from various protocols.

POC:https://github.com/ShutdownRepo/ShadowCoerce
тех анализ: https://pentestlaboratories.com/2022/01/11/shadowcoerce/
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх