<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Laps on MrAzoth</title>
    <link>https://az0th.it/tags/laps/</link>
    <description>Recent content in Laps on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/laps/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Advanced Techniques — From Windows</title>
      <link>https://az0th.it/ad/windows/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp (RBCD)&lt;/td&gt;
          &lt;td&gt;KrbRelayUp + Rubeus&lt;/td&gt;
          &lt;td&gt;Domain-joined, no LDAP signing&lt;/td&gt;
          &lt;td&gt;Low-priv → SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;GMSAPasswordReader&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS password read&lt;/td&gt;
          &lt;td&gt;Get-AdmPwdPassword / PowerView&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (mimidrv)&lt;/td&gt;
          &lt;td&gt;Mimikatz + mimidrv.sys&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (PPLdump)&lt;/td&gt;
          &lt;td&gt;PPLdump&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (comsvcs)&lt;/td&gt;
          &lt;td&gt;LOLBAS / rundll32&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV coercion trigger&lt;/td&gt;
          &lt;td&gt;PowerShell&lt;/td&gt;
          &lt;td&gt;Shell on target&lt;/td&gt;
          &lt;td&gt;Force HTTP auth for relay&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Shadow credentials&lt;/td&gt;
          &lt;td&gt;Whisker&lt;/td&gt;
          &lt;td&gt;GenericWrite on account&lt;/td&gt;
          &lt;td&gt;PKINIT auth, NT hash&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;krbrelayup--local-privilege-escalation-to-system&#34;&gt;KrbRelayUp — Local Privilege Escalation to SYSTEM&lt;/h2&gt;
&lt;h3 id=&#34;what-krbrelayup-is&#34;&gt;What KrbRelayUp Is&lt;/h3&gt;
&lt;p&gt;KrbRelayUp abuses Resource-Based Constrained Delegation (RBCD) to escalate from a low-privilege domain user with a local shell to &lt;code&gt;NT AUTHORITY\SYSTEM&lt;/code&gt; on the same machine. The attack creates a new machine account, configures RBCD on the target machine to trust that new account, then uses S4U2Self + S4U2Proxy to get a Kerberos service ticket impersonating &lt;code&gt;Administrator&lt;/code&gt; (or any domain user) for the current machine — then uses that ticket to spawn a SYSTEM process.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
