<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Webdav on MrAzoth</title>
    <link>https://az0th.it/tags/webdav/</link>
    <description>Recent content in Webdav on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/webdav/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Advanced Techniques — From Windows</title>
      <link>https://az0th.it/ad/windows/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp (RBCD)&lt;/td&gt;
          &lt;td&gt;KrbRelayUp + Rubeus&lt;/td&gt;
          &lt;td&gt;Domain-joined, no LDAP signing&lt;/td&gt;
          &lt;td&gt;Low-priv → SYSTEM&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;GMSAPasswordReader&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS password read&lt;/td&gt;
          &lt;td&gt;Get-AdmPwdPassword / PowerView&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (mimidrv)&lt;/td&gt;
          &lt;td&gt;Mimikatz + mimidrv.sys&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;PPL bypass (PPLdump)&lt;/td&gt;
          &lt;td&gt;PPLdump&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;LSASS dump despite PPL&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (comsvcs)&lt;/td&gt;
          &lt;td&gt;LOLBAS / rundll32&lt;/td&gt;
          &lt;td&gt;Local admin&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV coercion trigger&lt;/td&gt;
          &lt;td&gt;PowerShell&lt;/td&gt;
          &lt;td&gt;Shell on target&lt;/td&gt;
          &lt;td&gt;Force HTTP auth for relay&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Shadow credentials&lt;/td&gt;
          &lt;td&gt;Whisker&lt;/td&gt;
          &lt;td&gt;GenericWrite on account&lt;/td&gt;
          &lt;td&gt;PKINIT auth, NT hash&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;krbrelayup--local-privilege-escalation-to-system&#34;&gt;KrbRelayUp — Local Privilege Escalation to SYSTEM&lt;/h2&gt;
&lt;h3 id=&#34;what-krbrelayup-is&#34;&gt;What KrbRelayUp Is&lt;/h3&gt;
&lt;p&gt;KrbRelayUp abuses Resource-Based Constrained Delegation (RBCD) to escalate from a low-privilege domain user with a local shell to &lt;code&gt;NT AUTHORITY\SYSTEM&lt;/code&gt; on the same machine. The attack creates a new machine account, configures RBCD on the target machine to trust that new account, then uses S4U2Self + S4U2Proxy to get a Kerberos service ticket impersonating &lt;code&gt;Administrator&lt;/code&gt; (or any domain user) for the current machine — then uses that ticket to spawn a SYSTEM process.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advanced Techniques — From Kali</title>
      <link>https://az0th.it/ad/kali/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV Coercion → LDAP relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx + PetitPotam&lt;/td&gt;
          &lt;td&gt;WebClient running on target&lt;/td&gt;
          &lt;td&gt;RBCD, shadow creds, DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;gMSADumper / nxc&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Zerologon&lt;/td&gt;
          &lt;td&gt;cve-2020-1472&lt;/td&gt;
          &lt;td&gt;Network access to DC (pre-patch)&lt;/td&gt;
          &lt;td&gt;Instant DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;noPac (CVE-2021-42278/42287)&lt;/td&gt;
          &lt;td&gt;noPac.py&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;DA via KDC spoofing&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS read&lt;/td&gt;
          &lt;td&gt;nxc / ldapsearch&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (offline parse)&lt;/td&gt;
          &lt;td&gt;pypykatz&lt;/td&gt;
          &lt;td&gt;LSASS dump file&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp pre-check&lt;/td&gt;
          &lt;td&gt;nxc ldap&lt;/td&gt;
          &lt;td&gt;Network access&lt;/td&gt;
          &lt;td&gt;Identify LDAP signing state&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;webdav-coercion--bypass-smb-signing-for-ntlm-relay&#34;&gt;WebDAV Coercion — Bypass SMB Signing for NTLM Relay&lt;/h2&gt;
&lt;h3 id=&#34;why-webdav-coercion-works&#34;&gt;Why WebDAV Coercion Works&lt;/h3&gt;
&lt;p&gt;Standard NTLM relay from SMB to LDAP is blocked when SMB signing is required (which is enforced on DCs by default). WebDAV coercion forces the target to authenticate over HTTP instead of SMB. HTTP authentication does not enforce signing, so it can be relayed to LDAP even when the target has SMB signing enabled.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
