<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ad on MrAzoth</title>
    <link>https://az0th.it/tags/ad/</link>
    <description>Recent content in Ad on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/ad/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Enumeration &amp; Discovery — From Windows</title>
      <link>https://az0th.it/ad/windows/enumeration/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/enumeration/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Privilege Needed&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Domain / forest info&lt;/td&gt;
          &lt;td&gt;Native AD cmdlets, PowerView&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;User / group / computer enumeration&lt;/td&gt;
          &lt;td&gt;Get-ADUser, Get-DomainUser&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SPN discovery (Kerberoast candidates)&lt;/td&gt;
          &lt;td&gt;Get-ADUser, PowerView&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AdminSDHolder / privileged objects&lt;/td&gt;
          &lt;td&gt;Get-ADObject&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;ACL enumeration&lt;/td&gt;
          &lt;td&gt;PowerView&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Local admin discovery&lt;/td&gt;
          &lt;td&gt;Find-LocalAdminAccess&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Share discovery&lt;/td&gt;
          &lt;td&gt;Find-DomainShare, Snaffler&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Full graph collection&lt;/td&gt;
          &lt;td&gt;SharpHound&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Host recon&lt;/td&gt;
          &lt;td&gt;Seatbelt&lt;/td&gt;
          &lt;td&gt;Local user (some checks need admin)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Session enumeration&lt;/td&gt;
          &lt;td&gt;SharpHound, NetSessionEnum&lt;/td&gt;
          &lt;td&gt;Local admin (remote hosts)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPO enumeration&lt;/td&gt;
          &lt;td&gt;PowerView&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Trust mapping&lt;/td&gt;
          &lt;td&gt;Get-DomainTrust, nltest&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;native-ad-cmdlets&#34;&gt;Native AD Cmdlets&lt;/h2&gt;
&lt;p&gt;No extra tooling required. Requires the &lt;code&gt;ActiveDirectory&lt;/code&gt; PowerShell module, which is present on domain-joined systems with RSAT installed, or can be imported from a DC.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Kerberos Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/kerberos-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/kerberos-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Hashcat Mode&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;AS-REP Roasting&lt;/td&gt;
          &lt;td&gt;GetNPUsers.py / kerbrute&lt;/td&gt;
          &lt;td&gt;-m 18200&lt;/td&gt;
          &lt;td&gt;DONT_REQ_PREAUTH flag set&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Kerberoasting&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
          &lt;td&gt;-m 13100 (RC4) / -m 19700 (AES)&lt;/td&gt;
          &lt;td&gt;Valid domain user + SPN exists&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket&lt;/td&gt;
          &lt;td&gt;getTGT.py + impacket&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Valid credentials or hash&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Overpass-the-Hash&lt;/td&gt;
          &lt;td&gt;getTGT.py -aesKey&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;AES256 key for user&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Kerbrute userenum&lt;/td&gt;
          &lt;td&gt;kerbrute&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Network access to DC on port 88&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Ticket conversion&lt;/td&gt;
          &lt;td&gt;ticket_converter.py&lt;/td&gt;
          &lt;td&gt;N/A&lt;/td&gt;
          &lt;td&gt;Existing .kirbi or .ccache&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;as-rep-roasting&#34;&gt;AS-REP Roasting&lt;/h2&gt;
&lt;p&gt;AS-REP Roasting targets accounts that have Kerberos pre-authentication disabled (&lt;code&gt;DONT_REQ_PREAUTH&lt;/code&gt; flag set in &lt;code&gt;userAccountControl&lt;/code&gt;). The KDC returns an AS-REP containing a portion encrypted with the user&amp;rsquo;s hash — no prior authentication required, making it requestable by anyone.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Kerberos Attacks — From Windows</title>
      <link>https://az0th.it/ad/windows/kerberos-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/kerberos-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Prerequisite&lt;/th&gt;
          &lt;th&gt;Output&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Kerberoasting&lt;/td&gt;
          &lt;td&gt;Rubeus, PowerView&lt;/td&gt;
          &lt;td&gt;Domain user, SPN exists&lt;/td&gt;
          &lt;td&gt;RC4/AES hash → offline crack&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AS-REP Roasting&lt;/td&gt;
          &lt;td&gt;Rubeus&lt;/td&gt;
          &lt;td&gt;Domain user, pre-auth disabled on target&lt;/td&gt;
          &lt;td&gt;AS-REP hash → offline crack&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket&lt;/td&gt;
          &lt;td&gt;Rubeus, Mimikatz&lt;/td&gt;
          &lt;td&gt;Valid .kirbi or base64 ticket&lt;/td&gt;
          &lt;td&gt;Ticket injected into session&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Overpass-the-Hash&lt;/td&gt;
          &lt;td&gt;Mimikatz, Rubeus&lt;/td&gt;
          &lt;td&gt;NTLM or AES hash&lt;/td&gt;
          &lt;td&gt;TGT obtained, ticket injected&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Key&lt;/td&gt;
          &lt;td&gt;Mimikatz&lt;/td&gt;
          &lt;td&gt;AES256 hash&lt;/td&gt;
          &lt;td&gt;TGT obtained via AES pre-auth&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Ticket Extraction&lt;/td&gt;
          &lt;td&gt;Rubeus, Mimikatz&lt;/td&gt;
          &lt;td&gt;Local admin (for other users&amp;rsquo; tickets)&lt;/td&gt;
          &lt;td&gt;.kirbi files / base64 tickets&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;TGT Delegation&lt;/td&gt;
          &lt;td&gt;Rubeus tgtdeleg&lt;/td&gt;
          &lt;td&gt;Domain user, no local admin needed&lt;/td&gt;
          &lt;td&gt;Usable TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Ticket Harvesting&lt;/td&gt;
          &lt;td&gt;Rubeus harvest/monitor&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;Ongoing TGT collection&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Unconstrained Delegation Abuse&lt;/td&gt;
          &lt;td&gt;Rubeus monitor + coerce&lt;/td&gt;
          &lt;td&gt;Local admin on delegation host&lt;/td&gt;
          &lt;td&gt;Victim TGT captured&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;hashcat-cracking-modes-reference&#34;&gt;Hashcat Cracking Modes Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Mode&lt;/th&gt;
          &lt;th&gt;Hash Type&lt;/th&gt;
          &lt;th&gt;Attack Context&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;13100&lt;/td&gt;
          &lt;td&gt;Kerberoast — RC4 (TGS-REP)&lt;/td&gt;
          &lt;td&gt;Kerberoasting with /rc4opsec&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;19600&lt;/td&gt;
          &lt;td&gt;Kerberoast — AES128 (TGS-REP)&lt;/td&gt;
          &lt;td&gt;Kerberoasting with /aes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;19700&lt;/td&gt;
          &lt;td&gt;Kerberoast — AES256 (TGS-REP)&lt;/td&gt;
          &lt;td&gt;Kerberoasting with /aes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;18200&lt;/td&gt;
          &lt;td&gt;AS-REP — RC4 (krb5asrep)&lt;/td&gt;
          &lt;td&gt;AS-REP Roasting&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;17200&lt;/td&gt;
          &lt;td&gt;DPAPI masterkey&lt;/td&gt;
          &lt;td&gt;Seatbelt / Mimikatz DPAPI&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;1000&lt;/td&gt;
          &lt;td&gt;NTLM&lt;/td&gt;
          &lt;td&gt;Pass-the-Hash, secretsdump output&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;5600&lt;/td&gt;
          &lt;td&gt;NTLMv2 (Net-NTLMv2)&lt;/td&gt;
          &lt;td&gt;Responder / NTLM relay capture&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;7500&lt;/td&gt;
          &lt;td&gt;Kerberos 5 AS-REQ (etype 23)&lt;/td&gt;
          &lt;td&gt;Pre-auth brute force&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;3000&lt;/td&gt;
          &lt;td&gt;LM&lt;/td&gt;
          &lt;td&gt;Legacy — rarely seen&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;kerberoasting&#34;&gt;Kerberoasting&lt;/h2&gt;
&lt;p&gt;Kerberoasting requests Kerberos service tickets (TGS-REP) for accounts with a Service Principal Name (SPN) set. The ticket is encrypted with the service account&amp;rsquo;s password hash, enabling offline cracking.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Credential Attacks — From Windows</title>
      <link>https://az0th.it/ad/windows/credential-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/credential-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Privilege Required&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (live)&lt;/td&gt;
          &lt;td&gt;Mimikatz&lt;/td&gt;
          &lt;td&gt;LocalAdmin + SeDebugPrivilege&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (ProcDump)&lt;/td&gt;
          &lt;td&gt;ProcDump / comsvcs.dll&lt;/td&gt;
          &lt;td&gt;LocalAdmin&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;Mimikatz lsadump::dcsync&lt;/td&gt;
          &lt;td&gt;Domain Admin (or replication rights)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Local SAM&lt;/td&gt;
          &lt;td&gt;reg save + secretsdump&lt;/td&gt;
          &lt;td&gt;LocalAdmin&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSA Secrets&lt;/td&gt;
          &lt;td&gt;Mimikatz lsadump::lsa&lt;/td&gt;
          &lt;td&gt;SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cached domain creds&lt;/td&gt;
          &lt;td&gt;Mimikatz lsadump::cache&lt;/td&gt;
          &lt;td&gt;SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPP passwords&lt;/td&gt;
          &lt;td&gt;PowerSploit Get-GPPPassword&lt;/td&gt;
          &lt;td&gt;Domain User (SYSVOL read)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DPAPI triage&lt;/td&gt;
          &lt;td&gt;SharpDPAPI&lt;/td&gt;
          &lt;td&gt;LocalAdmin (backup key needs DA)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WDigest cleartext&lt;/td&gt;
          &lt;td&gt;Mimikatz sekurlsa::wdigest&lt;/td&gt;
          &lt;td&gt;LocalAdmin + WDigest enabled&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Skeleton key&lt;/td&gt;
          &lt;td&gt;Mimikatz misc::skeleton&lt;/td&gt;
          &lt;td&gt;Domain Admin (DC access)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SSP injection&lt;/td&gt;
          &lt;td&gt;Mimikatz misc::memssp&lt;/td&gt;
          &lt;td&gt;SYSTEM on DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Password spray&lt;/td&gt;
          &lt;td&gt;DomainPasswordSpray / Rubeus&lt;/td&gt;
          &lt;td&gt;Domain User&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass&lt;/td&gt;
          &lt;td&gt;mimidrv.sys kernel driver&lt;/td&gt;
          &lt;td&gt;SYSTEM + vulnerable driver&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;mimikatz--core-commands&#34;&gt;Mimikatz — Core Commands&lt;/h2&gt;
&lt;p&gt;Mimikatz is the primary credential extraction tool for Windows. Most operations require &lt;code&gt;SeDebugPrivilege&lt;/code&gt; at minimum, and many require SYSTEM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Credential Attacks &amp; Relay — From Kali</title>
      <link>https://az0th.it/ad/kali/credential-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/credential-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Prerequisite&lt;/th&gt;
          &lt;th&gt;Output&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;LLMNR/NBT-NS Poisoning&lt;/td&gt;
          &lt;td&gt;Responder&lt;/td&gt;
          &lt;td&gt;Network access, no SMB signing required&lt;/td&gt;
          &lt;td&gt;NTLMv1/v2 hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SMB Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;SMB signing disabled on target&lt;/td&gt;
          &lt;td&gt;SAM dump / shell&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LDAP Relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx.py&lt;/td&gt;
          &lt;td&gt;LDAP on DC accessible&lt;/td&gt;
          &lt;td&gt;Computer accounts / RBCD&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;IPv6 Poisoning&lt;/td&gt;
          &lt;td&gt;mitm6 + ntlmrelayx&lt;/td&gt;
          &lt;td&gt;IPv6 not disabled on network&lt;/td&gt;
          &lt;td&gt;LDAP relay → DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coercion + Relay&lt;/td&gt;
          &lt;td&gt;PetitPotam / printerbug&lt;/td&gt;
          &lt;td&gt;Auth path to coerced machine&lt;/td&gt;
          &lt;td&gt;NTLM relay or TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;secretsdump.py&lt;/td&gt;
          &lt;td&gt;Domain Admin or replication rights&lt;/td&gt;
          &lt;td&gt;All NTLM hashes + AES keys&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS Dump&lt;/td&gt;
          &lt;td&gt;lsassy&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
          &lt;td&gt;Plaintext / hashes&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPP Passwords&lt;/td&gt;
          &lt;td&gt;nxc -M gpp_password&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;Cleartext credential&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Password Spraying&lt;/td&gt;
          &lt;td&gt;nxc smb/ldap&lt;/td&gt;
          &lt;td&gt;Valid username list&lt;/td&gt;
          &lt;td&gt;Valid credentials&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;llmnrnbt-ns-poisoning-with-responder&#34;&gt;LLMNR/NBT-NS Poisoning with Responder&lt;/h2&gt;
&lt;p&gt;LLMNR (Link-Local Multicast Name Resolution) and NBT-NS (NetBIOS Name Service) are fallback name resolution protocols used by Windows when DNS fails. When a host cannot resolve a name, it broadcasts an LLMNR/NBT-NS query to the local subnet. Responder answers these queries with the attacker&amp;rsquo;s IP, forcing the victim to authenticate — capturing NTLMv1 or NTLMv2 hashes.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Delegation Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/delegation-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/delegation-attacks/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Required Privileges&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Unconstrained Delegation Abuse&lt;/td&gt;
          &lt;td&gt;impacket, Responder, coercion tools&lt;/td&gt;
          &lt;td&gt;Compromise of delegated host&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Constrained Delegation (KCD)&lt;/td&gt;
          &lt;td&gt;getST.py&lt;/td&gt;
          &lt;td&gt;Control of account with KCD configured&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;RBCD Setup + Abuse&lt;/td&gt;
          &lt;td&gt;addcomputer.py, rbcd.py, getST.py&lt;/td&gt;
          &lt;td&gt;GenericWrite or WriteDACL on target computer&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Shadow Credentials&lt;/td&gt;
          &lt;td&gt;pywhisker.py, getnthash.py&lt;/td&gt;
          &lt;td&gt;WriteProperty on msDS-KeyCredentialLink&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coerce Authentication (PetitPotam)&lt;/td&gt;
          &lt;td&gt;PetitPotam.py&lt;/td&gt;
          &lt;td&gt;Valid domain credentials&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Coerce Authentication (PrinterBug)&lt;/td&gt;
          &lt;td&gt;printerbug.py&lt;/td&gt;
          &lt;td&gt;Valid domain credentials&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;delegation-overview&#34;&gt;Delegation Overview&lt;/h2&gt;
&lt;p&gt;Kerberos delegation allows a service to impersonate users when accessing other services on their behalf. There are three types, each with different risk profiles and abuse paths.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lateral Movement — From Kali</title>
      <link>https://az0th.it/ad/kali/lateral-movement/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/lateral-movement/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Auth Type&lt;/th&gt;
          &lt;th&gt;Notes&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Hash&lt;/td&gt;
          &lt;td&gt;psexec.py, wmiexec.py, nxc&lt;/td&gt;
          &lt;td&gt;NTLM hash&lt;/td&gt;
          &lt;td&gt;No plaintext needed&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket&lt;/td&gt;
          &lt;td&gt;psexec.py -k, wmiexec.py -k&lt;/td&gt;
          &lt;td&gt;Kerberos ccache&lt;/td&gt;
          &lt;td&gt;Set KRB5CCNAME first&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Evil-WinRM&lt;/td&gt;
          &lt;td&gt;evil-winrm&lt;/td&gt;
          &lt;td&gt;Password / Hash / Ticket&lt;/td&gt;
          &lt;td&gt;WinRM port 5985/5986&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WMI Execution&lt;/td&gt;
          &lt;td&gt;wmiexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Output shown, less noisy&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCOM Execution&lt;/td&gt;
          &lt;td&gt;dcomexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Multiple COM objects&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;RDP PtH&lt;/td&gt;
          &lt;td&gt;xfreerdp /pth&lt;/td&gt;
          &lt;td&gt;NTLM hash&lt;/td&gt;
          &lt;td&gt;Requires Restricted Admin mode&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SMB Exec&lt;/td&gt;
          &lt;td&gt;psexec.py, smbexec.py&lt;/td&gt;
          &lt;td&gt;Password / Hash&lt;/td&gt;
          &lt;td&gt;Different noise levels&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Proxychains&lt;/td&gt;
          &lt;td&gt;proxychains + any tool&lt;/td&gt;
          &lt;td&gt;Any&lt;/td&gt;
          &lt;td&gt;Internal network pivoting&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;pass-the-hash-pth-from-linux&#34;&gt;Pass-the-Hash (PtH) from Linux&lt;/h2&gt;
&lt;h3 id=&#34;concept&#34;&gt;Concept&lt;/h3&gt;
&lt;p&gt;NTLM authentication does not require knowledge of the plaintext password — it only requires the NT hash. The NT hash is the MD4 hash of the Unicode password, and it is used directly in the NTLM challenge-response exchange. A valid NT hash is sufficient to authenticate against any service using NTLM.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lateral Movement — From Windows</title>
      <link>https://az0th.it/ad/windows/lateral-movement/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/lateral-movement/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Hash (PtH)&lt;/td&gt;
          &lt;td&gt;Mimikatz, Invoke-TheHash, PsExec&lt;/td&gt;
          &lt;td&gt;Local Admin / NTLM hash&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Ticket (PtT)&lt;/td&gt;
          &lt;td&gt;Rubeus, Mimikatz&lt;/td&gt;
          &lt;td&gt;Valid Kerberos ticket (.kirbi / base64)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Overpass-the-Hash&lt;/td&gt;
          &lt;td&gt;Mimikatz, Rubeus&lt;/td&gt;
          &lt;td&gt;NTLM or AES256 hash&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WMI Exec&lt;/td&gt;
          &lt;td&gt;PowerShell WMI, wmic, SharpWMI&lt;/td&gt;
          &lt;td&gt;Local Admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DCOM Exec&lt;/td&gt;
          &lt;td&gt;PowerShell COM objects&lt;/td&gt;
          &lt;td&gt;Local Admin / DCOM permissions&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PowerShell Remoting&lt;/td&gt;
          &lt;td&gt;Enter-PSSession, Invoke-Command&lt;/td&gt;
          &lt;td&gt;WinRM enabled, appropriate rights&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PsExec&lt;/td&gt;
          &lt;td&gt;Sysinternals PsExec&lt;/td&gt;
          &lt;td&gt;Local Admin, ADMIN$ writable&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Remote Service&lt;/td&gt;
          &lt;td&gt;sc.exe&lt;/td&gt;
          &lt;td&gt;Local Admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Scheduled Task&lt;/td&gt;
          &lt;td&gt;schtasks.exe&lt;/td&gt;
          &lt;td&gt;Local Admin / valid credentials&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Token Impersonation&lt;/td&gt;
          &lt;td&gt;Incognito, Invoke-TokenManipulation&lt;/td&gt;
          &lt;td&gt;SeImpersonatePrivilege&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;RDP&lt;/td&gt;
          &lt;td&gt;mstsc, tscon&lt;/td&gt;
          &lt;td&gt;RDP enabled, valid credentials or SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;pass-the-hash-pth&#34;&gt;Pass-the-Hash (PtH)&lt;/h2&gt;
&lt;p&gt;Pass-the-Hash abuses the NTLM authentication protocol by presenting a captured password hash directly instead of the cleartext password. The target authenticates the hash without needing the plaintext credential.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Domain &amp; Forest Trusts — From Kali</title>
      <link>https://az0th.it/ad/kali/domain-trusts/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/domain-trusts/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain Kerberoasting&lt;/td&gt;
          &lt;td&gt;Valid low-priv creds in child domain&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain AS-REP Roasting&lt;/td&gt;
          &lt;td&gt;Valid low-priv creds in child domain&lt;/td&gt;
          &lt;td&gt;GetNPUsers.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;SID History Injection (parent-child)&lt;/td&gt;
          &lt;td&gt;Domain Admin in child domain, child krbtgt hash&lt;/td&gt;
          &lt;td&gt;ticketer.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-domain DCSync&lt;/td&gt;
          &lt;td&gt;Replication rights or DA in target domain&lt;/td&gt;
          &lt;td&gt;secretsdump.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;One-way inbound trust abuse&lt;/td&gt;
          &lt;td&gt;DA in trusted domain, inter-realm key&lt;/td&gt;
          &lt;td&gt;ticketer.py (silver), getST.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;One-way outbound trust abuse&lt;/td&gt;
          &lt;td&gt;DA in trusting domain, TDO GUID&lt;/td&gt;
          &lt;td&gt;secretsdump.py, getTGT.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Cross-forest Kerberoasting&lt;/td&gt;
          &lt;td&gt;Bidirectional forest trust, valid creds&lt;/td&gt;
          &lt;td&gt;GetUserSPNs.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden ticket cross-domain&lt;/td&gt;
          &lt;td&gt;Child krbtgt hash + parent domain SID&lt;/td&gt;
          &lt;td&gt;ticketer.py&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;BloodHound trust mapping&lt;/td&gt;
          &lt;td&gt;Valid creds, network access to DC&lt;/td&gt;
          &lt;td&gt;bloodhound-python&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;trust-concepts&#34;&gt;Trust Concepts&lt;/h2&gt;
&lt;h3 id=&#34;trust-types&#34;&gt;Trust Types&lt;/h3&gt;
&lt;p&gt;A &lt;strong&gt;Trust&lt;/strong&gt; is a relationship between two domains that allows security principals in one domain to authenticate to resources in another. Trust information is stored in Active Directory as &lt;strong&gt;Trusted Domain Objects (TDOs)&lt;/strong&gt; under &lt;code&gt;CN=System&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Persistence — From Kali</title>
      <link>https://az0th.it/ad/kali/persistence/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/persistence/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Detection Risk&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;DCSync&lt;/td&gt;
          &lt;td&gt;Domain Admin or explicit replication rights&lt;/td&gt;
          &lt;td&gt;High — replication request from non-DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden Ticket&lt;/td&gt;
          &lt;td&gt;krbtgt NTLM + AES256 hash, domain SID&lt;/td&gt;
          &lt;td&gt;Medium — no TGT event (4768) on DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Silver Ticket&lt;/td&gt;
          &lt;td&gt;Service account NTLM hash, domain SID, SPN&lt;/td&gt;
          &lt;td&gt;Low — no DC contact at all&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Diamond Ticket&lt;/td&gt;
          &lt;td&gt;krbtgt AES256, valid user credentials&lt;/td&gt;
          &lt;td&gt;Low — based on a real TGT&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;NTDS.dit VSS&lt;/td&gt;
          &lt;td&gt;Shell on DC, local admin&lt;/td&gt;
          &lt;td&gt;High — shadow copy creation event&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;DPAPI Backup Key&lt;/td&gt;
          &lt;td&gt;Domain Admin, DC access&lt;/td&gt;
          &lt;td&gt;Medium — LDAP/RPC request to DC&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;ACL-based (DCSync rights)&lt;/td&gt;
          &lt;td&gt;WriteDACL or GenericAll on domain root&lt;/td&gt;
          &lt;td&gt;Low — ACL change may not alert&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Machine Account creation&lt;/td&gt;
          &lt;td&gt;Any user with MachineAccountQuota &amp;gt; 0&lt;/td&gt;
          &lt;td&gt;Low&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Pass-the-Hash persistence&lt;/td&gt;
          &lt;td&gt;Local admin hash, no domain rights needed&lt;/td&gt;
          &lt;td&gt;Low — appears as normal auth&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;dcsync&#34;&gt;DCSync&lt;/h2&gt;
&lt;h3 id=&#34;what-it-is&#34;&gt;What It Is&lt;/h3&gt;
&lt;p&gt;DCSync abuses the &lt;strong&gt;Directory Replication Service (DRS)&lt;/strong&gt; protocol. Domain controllers use DRS to replicate directory data between themselves. The &lt;code&gt;GetNCChanges&lt;/code&gt; function is the core RPC call used. Any account with the following rights on the domain root object can invoke this:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advanced Techniques — From Windows</title>
      <link>https://az0th.it/ad/windows/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp (RBCD)&lt;/td&gt;
          &lt;td&gt;KrbRelayUp + Rubeus&lt;/td&gt;
          &lt;td&gt;Domain-joined, no LDAP signing&lt;/td&gt;
          &lt;td&gt;Low-priv → SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;GMSAPasswordReader&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS password read&lt;/td&gt;
          &lt;td&gt;Get-AdmPwdPassword / PowerView&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (mimidrv)&lt;/td&gt;
          &lt;td&gt;Mimikatz + mimidrv.sys&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (PPLdump)&lt;/td&gt;
          &lt;td&gt;PPLdump&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (comsvcs)&lt;/td&gt;
          &lt;td&gt;LOLBAS / rundll32&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV coercion trigger&lt;/td&gt;
          &lt;td&gt;PowerShell&lt;/td&gt;
          &lt;td&gt;Shell on target&lt;/td&gt;
          &lt;td&gt;Force HTTP auth for relay&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Shadow credentials&lt;/td&gt;
          &lt;td&gt;Whisker&lt;/td&gt;
          &lt;td&gt;GenericWrite on account&lt;/td&gt;
          &lt;td&gt;PKINIT auth, NT hash&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;krbrelayup--local-privilege-escalation-to-system&#34;&gt;KrbRelayUp — Local Privilege Escalation to SYSTEM&lt;/h2&gt;
&lt;h3 id=&#34;what-krbrelayup-is&#34;&gt;What KrbRelayUp Is&lt;/h3&gt;
&lt;p&gt;KrbRelayUp abuses Resource-Based Constrained Delegation (RBCD) to escalate from a low-privilege domain user with a local shell to &lt;code&gt;NT AUTHORITY\SYSTEM&lt;/code&gt; on the same machine. The attack creates a new machine account, configures RBCD on the target machine to trust that new account, then uses S4U2Self + S4U2Proxy to get a Kerberos service ticket impersonating &lt;code&gt;Administrator&lt;/code&gt; (or any domain user) for the current machine — then uses that ticket to spawn a SYSTEM process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Azure AD Hybrid Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/azure-hybrid/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/azure-hybrid/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Attack&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;MSOL Account DCSync&lt;/td&gt;
          &lt;td&gt;Local admin on AAD Connect server&lt;/td&gt;
          &lt;td&gt;Full domain + cloud compromise&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AZUREADSSOACC$ Abuse&lt;/td&gt;
          &lt;td&gt;DCSync rights or DA&lt;/td&gt;
          &lt;td&gt;Forge Azure AD tokens&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PHS Hash Extraction&lt;/td&gt;
          &lt;td&gt;MSOL DCSync rights&lt;/td&gt;
          &lt;td&gt;Cloud account takeover&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PTA Abuse&lt;/td&gt;
          &lt;td&gt;On-prem DC compromise&lt;/td&gt;
          &lt;td&gt;Transparent cloud auth bypass&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Golden SAML&lt;/td&gt;
          &lt;td&gt;ADFS signing cert theft&lt;/td&gt;
          &lt;td&gt;Persistent cloud access&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;azure-ad-connect-abuse-msol-account&#34;&gt;Azure AD Connect Abuse (MSOL Account)&lt;/h2&gt;
&lt;p&gt;Azure AD Connect synchronizes on-premises Active Directory to Azure AD. During setup, it creates a service account named &lt;code&gt;MSOL_xxxxxxxx&lt;/code&gt; in the on-premises domain. This account is granted &lt;code&gt;DS-Replication-Get-Changes&lt;/code&gt; and &lt;code&gt;DS-Replication-Get-Changes-All&lt;/code&gt; on the domain root — the exact permissions required for DCSync. Its password is stored encrypted in a SQL LocalDB instance on the AAD Connect server.&lt;/p&gt;</description>
    </item>
    <item>
      <title>GPO Abuse — From Windows</title>
      <link>https://az0th.it/ad/windows/gpo-abuse/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/gpo-abuse/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Effect&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Immediate Scheduled Task&lt;/td&gt;
          &lt;td&gt;SharpGPOAbuse&lt;/td&gt;
          &lt;td&gt;Write on GPO&lt;/td&gt;
          &lt;td&gt;Code exec as SYSTEM on all linked machines&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Restricted Groups&lt;/td&gt;
          &lt;td&gt;SharpGPOAbuse&lt;/td&gt;
          &lt;td&gt;Write on GPO&lt;/td&gt;
          &lt;td&gt;Add attacker to local Admins&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;User Rights Assignment&lt;/td&gt;
          &lt;td&gt;SharpGPOAbuse&lt;/td&gt;
          &lt;td&gt;Write on GPO&lt;/td&gt;
          &lt;td&gt;Grant SeDebugPrivilege / SeImpersonatePrivilege&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Manual XML task&lt;/td&gt;
          &lt;td&gt;PowerShell / SYSVOL write&lt;/td&gt;
          &lt;td&gt;Write on GPO or SYSVOL&lt;/td&gt;
          &lt;td&gt;Arbitrary command as SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;New GPO + Link&lt;/td&gt;
          &lt;td&gt;PowerView / RSAT&lt;/td&gt;
          &lt;td&gt;CreateGPO right + link permission&lt;/td&gt;
          &lt;td&gt;Full control over target OU&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;GPO Delegation read&lt;/td&gt;
          &lt;td&gt;PowerView / BloodHound&lt;/td&gt;
          &lt;td&gt;Any domain user&lt;/td&gt;
          &lt;td&gt;Map attack surface&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;gpo-fundamentals&#34;&gt;GPO Fundamentals&lt;/h2&gt;
&lt;p&gt;Group Policy Objects (GPOs) are containers of policy settings applied to users and computers. They are linked to Organizational Units (OUs), Sites, or the Domain. When a machine or user logs in, the domain controller delivers applicable GPOs via SYSVOL (a shared folder replicated to all DCs). The machine then applies them every 90 minutes by default (± 30-minute random offset), or immediately on &lt;code&gt;gpupdate /force&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advanced Techniques — From Kali</title>
      <link>https://az0th.it/ad/kali/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV Coercion → LDAP relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx + PetitPotam&lt;/td&gt;
          &lt;td&gt;WebClient running on target&lt;/td&gt;
          &lt;td&gt;RBCD, shadow creds, DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;gMSADumper / nxc&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Zerologon&lt;/td&gt;
          &lt;td&gt;cve-2020-1472&lt;/td&gt;
          &lt;td&gt;Network access to DC (pre-patch)&lt;/td&gt;
          &lt;td&gt;Instant DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;noPac (CVE-2021-42278/42287)&lt;/td&gt;
          &lt;td&gt;noPac.py&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;DA via KDC spoofing&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS read&lt;/td&gt;
          &lt;td&gt;nxc / ldapsearch&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (offline parse)&lt;/td&gt;
          &lt;td&gt;pypykatz&lt;/td&gt;
          &lt;td&gt;LSASS dump file&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp pre-check&lt;/td&gt;
          &lt;td&gt;nxc ldap&lt;/td&gt;
          &lt;td&gt;Network access&lt;/td&gt;
          &lt;td&gt;Identify LDAP signing state&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;webdav-coercion--bypass-smb-signing-for-ntlm-relay&#34;&gt;WebDAV Coercion — Bypass SMB Signing for NTLM Relay&lt;/h2&gt;
&lt;h3 id=&#34;why-webdav-coercion-works&#34;&gt;Why WebDAV Coercion Works&lt;/h3&gt;
&lt;p&gt;Standard NTLM relay from SMB to LDAP is blocked when SMB signing is required (which is enforced on DCs by default). WebDAV coercion forces the target to authenticate over HTTP instead of SMB. HTTP authentication does not enforce signing, so it can be relayed to LDAP even when the target has SMB signing enabled.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
