<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Zerologon on MrAzoth</title>
    <link>https://az0th.it/tags/zerologon/</link>
    <description>Recent content in Zerologon on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/zerologon/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Advanced Techniques — From Kali</title>
      <link>https://az0th.it/ad/kali/advanced-techniques/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/advanced-techniques/</guid>
      <description>&lt;h2 id=&#34;quick-reference&#34;&gt;Quick Reference&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Technique&lt;/th&gt;
          &lt;th&gt;Tool&lt;/th&gt;
          &lt;th&gt;Requirement&lt;/th&gt;
          &lt;th&gt;Impact&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;WebDAV Coercion → LDAP relay&lt;/td&gt;
          &lt;td&gt;ntlmrelayx + PetitPotam&lt;/td&gt;
          &lt;td&gt;WebClient running on target&lt;/td&gt;
          &lt;td&gt;RBCD, shadow creds, DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;gMSA password read&lt;/td&gt;
          &lt;td&gt;gMSADumper / nxc&lt;/td&gt;
          &lt;td&gt;Authorized principal&lt;/td&gt;
          &lt;td&gt;Lateral movement&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Zerologon&lt;/td&gt;
          &lt;td&gt;cve-2020-1472&lt;/td&gt;
          &lt;td&gt;Network access to DC (pre-patch)&lt;/td&gt;
          &lt;td&gt;Instant DA&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;noPac (CVE-2021-42278/42287)&lt;/td&gt;
          &lt;td&gt;noPac.py&lt;/td&gt;
          &lt;td&gt;Domain user&lt;/td&gt;
          &lt;td&gt;DA via KDC spoofing&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LAPS read&lt;/td&gt;
          &lt;td&gt;nxc / ldapsearch&lt;/td&gt;
          &lt;td&gt;Read perm on ms-Mcs-AdmPwd&lt;/td&gt;
          &lt;td&gt;Local admin on target&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;LSASS dump (offline parse)&lt;/td&gt;
          &lt;td&gt;pypykatz&lt;/td&gt;
          &lt;td&gt;LSASS dump file&lt;/td&gt;
          &lt;td&gt;Credential extraction&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;KrbRelayUp pre-check&lt;/td&gt;
          &lt;td&gt;nxc ldap&lt;/td&gt;
          &lt;td&gt;Network access&lt;/td&gt;
          &lt;td&gt;Identify LDAP signing state&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id=&#34;webdav-coercion--bypass-smb-signing-for-ntlm-relay&#34;&gt;WebDAV Coercion — Bypass SMB Signing for NTLM Relay&lt;/h2&gt;
&lt;h3 id=&#34;why-webdav-coercion-works&#34;&gt;Why WebDAV Coercion Works&lt;/h3&gt;
&lt;p&gt;Standard NTLM relay from SMB to LDAP is blocked when SMB signing is required (which is enforced on DCs by default). WebDAV coercion forces the target to authenticate over HTTP instead of SMB. HTTP authentication does not enforce signing, so it can be relayed to LDAP even when the target has SMB signing enabled.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
