<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>AD — From Kali / Linux on MrAzoth</title>
    <link>https://az0th.it/ad/kali/</link>
    <description>Recent content in AD — From Kali / Linux on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/ad/kali/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Enumeration &amp; Discovery — From Kali</title>
      <link>https://az0th.it/ad/kali/enumeration/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/enumeration/</guid>
      <description>Comprehensive Active Directory enumeration from a Kali/Linux attacker host: port scanning, DNS, LDAP, BloodHound, Kerbrute, NetExec, rpcclient, windapsearch, and more.</description>
    </item>
    <item>
      <title>Kerberos Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/kerberos-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/kerberos-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Hashcat Mode&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;AS-REP Roasting&lt;/td&gt;
          &lt;td&gt;GetNPUsers.py / kerbrute&lt;/td&gt;
          &lt;td&gt;-m 18200&lt;/td&gt;
          &lt;td&gt;DONT_REQ_PREAUTH flag set&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Kerberoasting&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
          &lt;td&gt;-m 13100 (RC4) / -m 19700 (AES)&lt;/td&gt;
          &lt;td&gt;Valid domain user + SPN exists&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket&lt;/td&gt;
          &lt;td&gt;getTGT.py + impacket&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Valid credentials or hash&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Overpass-the-Hash&lt;/td&gt;
          &lt;td&gt;getTGT.py -aesKey&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;AES256 key for user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Kerbrute userenum&lt;/td&gt;
          &lt;td&gt;kerbrute&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Network access to DC on port 88&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Ticket conversion&lt;/td&gt;
          &lt;td&gt;ticket_converter.py&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Existing .kirbi or .ccache&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;as-rep-roasting&#34;&gt;AS-REP Roasting&lt;/h2&gt;
&lt;p&gt;AS-REP Roasting targets accounts that have Kerberos pre-authentication disabled (&lt;code&gt;DONT_REQ_PREAUTH&lt;/code&gt; flag set in &lt;code&gt;userAccountControl&lt;/code&gt;). The KDC returns an AS-REP containing a portion encrypted with the user&amp;rsquo;s hash — no prior authentication required, making it requestable by anyone.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Credential Attacks &amp; Relay — From Kali</title>
      <link>https://az0th.it/ad/kali/credential-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/credential-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Prerequisite&lt;/th&gt;
          &lt;th&gt;Output&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;LLMNR/NBT-NS Poisoning&lt;/td&gt;
          &lt;td&gt;Responder&lt;/td&gt;
          &lt;td&gt;Network access, no SMB signing required&lt;/td&gt;
          &lt;td&gt;NTLMv1/v2 hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SMB Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;SMB signing disabled on target&lt;/td&gt;
          &lt;td&gt;SAM dump / shell&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LDAP Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;LDAP on DC accessible&lt;/td&gt;
          &lt;td&gt;Computer accounts / RBCD&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;IPv6 Poisoning&lt;/td&gt;
          &lt;td&gt;mitm6 + ntlmrelayx&lt;/td&gt;
          &lt;td&gt;IPv6 not disabled on network&lt;/td&gt;
          &lt;td&gt;LDAP relay → DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coercion + Relay&lt;/td&gt;
          &lt;td&gt;PetitPotam / printerbug&lt;/td&gt;
          &lt;td&gt;Auth path to coerced machine&lt;/td&gt;
          &lt;td&gt;NTLM relay or TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;secretsdump.py&lt;/td&gt;
          &lt;td&gt;Domain Admin or replication rights&lt;/td&gt;
          &lt;td&gt;All NTLM hashes + AES keys&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS Dump&lt;/td&gt;
          &lt;td&gt;lsassy&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
          &lt;td&gt;Plaintext / hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPP Passwords&lt;/td&gt;
          &lt;td&gt;nxc -M gpp_password&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;Cleartext credential&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Password Spraying&lt;/td&gt;
          &lt;td&gt;nxc smb/ldap&lt;/td&gt;
          &lt;td&gt;Valid username list&lt;/td&gt;
          &lt;td&gt;Valid credentials&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;llmnrnbt-ns-poisoning-with-responder&#34;&gt;LLMNR/NBT-NS Poisoning with Responder&lt;/h2&gt;
&lt;p&gt;LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) are fallback name resolution protocols used by Windows when DNS fails. When a host cannot resolve a name, it broadcasts an LLMNR/NBT-NS query to the local subnet. Responder answers these queries with the attacker&amp;rsquo;s IP, forcing the victim to authenticate — capturing NTLMv1 or NTLMv2 hashes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Delegation Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/delegation-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/delegation-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Required Privileges&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Unconstrained Delegation Abuse&lt;/td&gt;
          &lt;td&gt;impacket, Responder, coercion tools&lt;/td&gt;
          &lt;td&gt;Compromise of delegated host&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Constrained Delegation (KCD)&lt;/td&gt;
          &lt;td&gt;getST.py&lt;/td&gt;
          &lt;td&gt;Control of account with KCD configured&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;RBCD Setup + Abuse&lt;/td&gt;
          &lt;td&gt;addcomputer.py, rbcd.py, getST.py&lt;/td&gt;
          &lt;td&gt;GenericWrite or WriteDACL on target computer&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Shadow Credentials&lt;/td&gt;
          &lt;td&gt;pywhisker.py, getnthash.py&lt;/td&gt;
          &lt;td&gt;WriteProperty on msDS-KeyCredentialLink&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coerce Authentication (PetitPotam)&lt;/td&gt;
          &lt;td&gt;PetitPotam.py&lt;/td&gt;
          &lt;td&gt;Valid domain credentials&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coerce Authentication (PrinterBug)&lt;/td&gt;
          &lt;td&gt;printerbug.py&lt;/td&gt;
          &lt;td&gt;Valid domain credentials&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;delegation-overview&#34;&gt;Delegation Overview&lt;/h2&gt;
&lt;p&gt;Kerberos delegation allows a service to impersonate users when accessing other services on their behalf. There are three types, each with different risk profiles and abuse paths.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lateral Movement — From Kali</title>
      <link>https://az0th.it/ad/kali/lateral-movement/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/lateral-movement/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Auth Type&lt;/th&gt;
          &lt;th&gt;Notes&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Hash&lt;/td&gt;
          &lt;td&gt;psexec.py, wmiexec.py, nxc&lt;/td&gt;
          &lt;td&gt;NTLM hash&lt;/td&gt;
          &lt;td&gt;No plaintext needed&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket&lt;/td&gt;
          &lt;td&gt;psexec.py -k, wmiexec.py -k&lt;/td&gt;
          &lt;td&gt;Kerberos ccache&lt;/td&gt;
          &lt;td&gt;Set KRB5CCNAME first&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Evil-WinRM&lt;/td&gt;
          &lt;td&gt;evil-winrm&lt;/td&gt;
          &lt;td&gt;Password / Hash / Ticket&lt;/td&gt;
          &lt;td&gt;WinRM port 5985/5986&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WMI Execution&lt;/td&gt;
          &lt;td&gt;wmiexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Output shown, less noisy&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCOM Execution&lt;/td&gt;
          &lt;td&gt;dcomexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Multiple COM objects&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;RDP PtH&lt;/td&gt;
          &lt;td&gt;xfreerdp /pth&lt;/td&gt;
          &lt;td&gt;NTLM hash&lt;/td&gt;
          &lt;td&gt;Requires Restricted Admin mode&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SMB Exec&lt;/td&gt;
          &lt;td&gt;psexec.py, smbexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Different noise levels&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Proxychains&lt;/td&gt;
          &lt;td&gt;proxychains + any tool&lt;/td&gt;
          &lt;td&gt;Any&lt;/td&gt;
          &lt;td&gt;Internal network pivoting&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;pass-the-hash-pth-from-linux&#34;&gt;Pass-the-Hash (PtH) from Linux&lt;/h2&gt;
&lt;h3 id=&#34;concept&#34;&gt;Concept&lt;/h3&gt;
&lt;p&gt;NTLM authentication does not require knowledge of the plaintext password — it only requires the NT hash. The NT hash is the MD4 hash of the Unicode password, and it is used directly in the NTLM challenge-response exchange. A valid NT hash is sufficient to authenticate against any service using NTLM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Domain &amp; Forest Trusts — From Kali</title>
      <link>https://az0th.it/ad/kali/domain-trusts/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/domain-trusts/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain Kerberoasting&lt;/td&gt;
          &lt;td&gt;Valid low-priv creds in child domain&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain AS-REP Roasting&lt;/td&gt;
          &lt;td&gt;Valid low-priv creds in child domain&lt;/td&gt;
          &lt;td&gt;GetNPUsers.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SID History Injection (parent-child)&lt;/td&gt;
          &lt;td&gt;Domain Admin in child domain, child krbtgt hash&lt;/td&gt;
          &lt;td&gt;ticketer.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain DCSync&lt;/td&gt;
          &lt;td&gt;Replication rights or DA in target domain&lt;/td&gt;
          &lt;td&gt;secretsdump.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;One-way inbound trust abuse&lt;/td&gt;
          &lt;td&gt;DA in trusted domain, inter-realm key&lt;/td&gt;
          &lt;td&gt;ticketer.py (silver), getST.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;One-way outbound trust abuse&lt;/td&gt;
          &lt;td&gt;DA in trusting domain, TDO GUID&lt;/td&gt;
          &lt;td&gt;secretsdump.py, getTGT.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-forest Kerberoasting&lt;/td&gt;
          &lt;td&gt;Bidirectional forest trust, valid creds&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden ticket cross-domain&lt;/td&gt;
          &lt;td&gt;Child krbtgt hash + parent domain SID&lt;/td&gt;
          &lt;td&gt;ticketer.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;BloodHound trust mapping&lt;/td&gt;
          &lt;td&gt;Valid creds, network access to DC&lt;/td&gt;
          &lt;td&gt;bloodhound-python&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;trust-concepts&#34;&gt;Trust Concepts&lt;/h2&gt;
&lt;h3 id=&#34;trust-types&#34;&gt;Trust Types&lt;/h3&gt;
&lt;p&gt;A &lt;strong&gt;Trust&lt;/strong&gt; is a relationship between two domains that allows security principals in one domain to authenticate to resources in another. Trust information is stored in Active Directory as &lt;strong&gt;Trusted Domain Objects (TDOs)&lt;/strong&gt; under &lt;code&gt;CN=System&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persistence — From Kali</title>
      <link>https://az0th.it/ad/kali/persistence/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/persistence/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Detection Risk&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;Domain Admin or explicit replication rights&lt;/td&gt;
          &lt;td&gt;High — replication request from non-DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden Ticket&lt;/td&gt;
          &lt;td&gt;krbtgt NTLM + AES256 hash, domain SID&lt;/td&gt;
          &lt;td&gt;Medium — no TGT event (4768) on DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Silver Ticket&lt;/td&gt;
          &lt;td&gt;Service account NTLM hash, domain SID, SPN&lt;/td&gt;
          &lt;td&gt;Low — no DC contact at all&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Diamond Ticket&lt;/td&gt;
          &lt;td&gt;krbtgt AES256, valid user credentials&lt;/td&gt;
          &lt;td&gt;Low — based on a real TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;NTDS.dit VSS&lt;/td&gt;
          &lt;td&gt;Shell on DC, local admin&lt;/td&gt;
          &lt;td&gt;High — shadow copy creation event&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DPAPI Backup Key&lt;/td&gt;
          &lt;td&gt;Domain Admin, DC access&lt;/td&gt;
          &lt;td&gt;Medium — LDAP/RPC request to DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;ACL-based (DCSync rights)&lt;/td&gt;
          &lt;td&gt;WriteDACL or GenericAll on domain root&lt;/td&gt;
          &lt;td&gt;Low — ACL change may not alert&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Machine Account creation&lt;/td&gt;
          &lt;td&gt;Any user with MachineAccountQuota &amp;gt; 0&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Hash persistence&lt;/td&gt;
          &lt;td&gt;Local admin hash, no domain rights needed&lt;/td&gt;
          &lt;td&gt;Low — appears as normal auth&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;dcsync&#34;&gt;DCSync&lt;/h2&gt;
&lt;h3 id=&#34;what-it-is&#34;&gt;What It Is&lt;/h3&gt;
&lt;p&gt;DCSync abuses the &lt;strong&gt;Directory Replication Service (DRS)&lt;/strong&gt; protocol. Domain controllers use DRS to replicate directory data between themselves. The &lt;code&gt;GetNCChanges&lt;/code&gt; function is the core RPC call used. Any account with the following rights on the domain root object can invoke this:&lt;/p&gt;</description>
    </item>
    <item>
      <title>AD CS Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/adcs-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/adcs-attacks/</guid>
      <description>Active Directory Certificate Services exploitation from Kali: ESC1-ESC8, Certipy enumeration, certificate request abuse, NTLM relay to CA, and Pass-the-Certificate.</description>
    </item>
    <item>
      <title>Azure AD Hybrid Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/azure-hybrid/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/azure-hybrid/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;MSOL Account DCSync&lt;/td&gt;
          &lt;td&gt;Local admin on AAD Connect server&lt;/td&gt;
          &lt;td&gt;Full domain + cloud compromise&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AZUREADSSOACC$ Abuse&lt;/td&gt;
          &lt;td&gt;DCSync rights or DA&lt;/td&gt;
          &lt;td&gt;Forge Azure AD tokens&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PHS Hash Extraction&lt;/td&gt;
          &lt;td&gt;MSOL DCSync rights&lt;/td&gt;
          &lt;td&gt;Cloud account takeover&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PTA Abuse&lt;/td&gt;
          &lt;td&gt;On-prem DC compromise&lt;/td&gt;
          &lt;td&gt;Transparent cloud auth bypass&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden SAML&lt;/td&gt;
          &lt;td&gt;ADFS signing cert theft&lt;/td&gt;
          &lt;td&gt;Persistent cloud access&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;azure-ad-connect-abuse-msol-account&#34;&gt;Azure AD Connect Abuse (MSOL Account)&lt;/h2&gt;
&lt;p&gt;Azure AD Connect synchronizes on-premises Active Directory to Azure AD. During setup, it creates a service account named &lt;code&gt;MSOL_xxxxxxxx&lt;/code&gt; in the on-premises domain. This account is granted &lt;code&gt;DS-Replication-Get-Changes&lt;/code&gt; and &lt;code&gt;DS-Replication-Get-Changes-All&lt;/code&gt; on the domain root — the exact permissions required for DCSync. Its password is stored encrypted in a SQL LocalDB instance on the AAD Connect server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advanced Techniques — From Kali</title>
      <link>https://az0th.it/ad/kali/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV Coercion → LDAP relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx + PetitPotam&lt;/td&gt;
          &lt;td&gt;WebClient running on target&lt;/td&gt;
          &lt;td&gt;RBCD, shadow creds, DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;gMSADumper / nxc&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Zerologon&lt;/td&gt;
          &lt;td&gt;cve-2020-1472&lt;/td&gt;
          &lt;td&gt;Network access to DC (pre-patch)&lt;/td&gt;
          &lt;td&gt;Instant DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;noPac (CVE-2021-42278/42287)&lt;/td&gt;
          &lt;td&gt;noPac.py&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;DA via KDC spoofing&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS read&lt;/td&gt;
          &lt;td&gt;nxc / ldapsearch&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (offline parse)&lt;/td&gt;
          &lt;td&gt;pypykatz&lt;/td&gt;
          &lt;td&gt;LSASS dump file&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp pre-check&lt;/td&gt;
          &lt;td&gt;nxc ldap&lt;/td&gt;
          &lt;td&gt;Network access&lt;/td&gt;
          &lt;td&gt;Identify LDAP signing state&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;webdav-coercion--bypass-smb-signing-for-ntlm-relay&#34;&gt;WebDAV Coercion — Bypass SMB Signing for NTLM Relay&lt;/h2&gt;
&lt;h3 id=&#34;why-webdav-coercion-works&#34;&gt;Why WebDAV Coercion Works&lt;/h3&gt;
&lt;p&gt;Standard NTLM relay from SMB to LDAP is blocked when SMB signing is required (which is enforced on DCs by default). WebDAV coercion forces the target to authenticate over HTTP instead of SMB. HTTP authentication does not enforce signing, so it can be relayed to LDAP even when the target has SMB signing enabled.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
