Wurzen, Deutschland
Joined January 2010
Martin Junge retweeted
๐Ÿ”’ Secure Bits ๐Ÿ’ก Do you use ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€ ๐—”๐—ฟ๐—บ๐—ผ๐—ฟ๐—ถ๐—ป๐—ด in your environment? If youโ€™ve followed my ๐—ฝ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ผ๐˜‚๐˜€ ๐—ฝ๐—ผ๐˜€๐˜๐˜€ on Kerberos internals, Kerberoasting, and Authentication Policies & Silos โ€” this oneโ€™s for you. Letโ€™s talk about Kerberos Armoring, technically known as FAST (Flexible Authentication Secure Tunneling) โ€” an ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜‚๐˜€๐—ฒ๐—ฑ ๐—ฏ๐˜‚๐˜ ๐—ฝ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ณ๐˜‚๐—น ๐—น๐—ฎ๐˜†๐—ฒ๐—ฟ of protection. ๐Ÿ’ฅ ๐—ช๐—ต๐˜† ๐—ถ๐˜ ๐—บ๐—ฎ๐˜๐˜๐—ฒ๐—ฟ๐˜€: During the initial Kerberos authentication (AS-REQ), a client sends: ๐Ÿ”น Client Name (username) ๐Ÿ”น Service Name (usually krbtgt) ๐Ÿ”น Encrypted timestamp (using a key derived from the userโ€™s password) An attacker who captures this traffic can ๐—ฏ๐—ฟ๐˜‚๐˜๐—ฒ-๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ฒ the encrypted timestamp offline to recover the ๐˜‚๐˜€๐—ฒ๐—ฟโ€™๐˜€ ๐˜€๐—ฒ๐—ฐ๐—ฟ๐—ฒ๐˜ ๐—ธ๐—ฒ๐˜† (potentially NT hash)ย โ€” enabling impersonation or password recovery. ๐Ÿ›ก๏ธ ๐—ช๐—ต๐—ฎ๐˜ ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€ ๐—”๐—ฟ๐—บ๐—ผ๐—ฟ๐—ถ๐—ป๐—ด ๐—ฑ๐—ผ๐—ฒ๐˜€: Kerberos Armoring protects these sensitive exchanges by encapsulating them in a secure tunnel, established using the computerโ€™s own TGT session key. โžก๏ธ This blocks offline brute-force attacks by encrypting the entire pre-auth request with strong key. โžก๏ธ Without the session key โ€” attackers get nothing usable. โš™๏ธย ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฒ๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐˜: โœ… On clients (GPO): Kerberos client support for claims, compound authentication, and Kerberos armoring โœ… On domain controllers (GPO): KDC support for claims, compound authentication, and Kerberos armoring ๐Ÿง  If you want to enforce it (๐—ณ๐—ฎ๐—ถ๐—น ๐—ถ๐—ณ ๐—ป๐—ผ๐˜ ๐—ฎ๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ), you can set: Fail authentication requests when Kerberos armoring is not available ๐Ÿ’ฌ ๐—”๐—ฟ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐—ฒ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ถ๐—ป๐—ด ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€ ๐—”๐—ฟ๐—บ๐—ผ๐—ฟ๐—ถ๐—ป๐—ด, or is your domain still vulnerable to offline password attacks? #SecureBits #Kerberos #CyberSecurity #ActiveDirectory #WindowsSecurity #HorizonSecured @BlueTeamDave
14
48
Martin Junge retweeted
Boot multiple operating systems from one USB drive
Martin Junge retweeted
๐Ÿ› ๏ธ ProxMenux Monitor es una herramienta para la gestiรณn de Proxmox VE github.com/MacRimi/ProxMenux
1
36
210
A list of open source games.
6
71
846
Martin Junge retweeted
โš ๏ธ Hackers Can Attack Active Directory Sites to Escalate Privileges and Domain Compromise | Read more: cybersecuritynews.com/activeโ€ฆ Active Directory sites are designed to optimize network performance across geographically separated organizations by managing replication and authentication across multiple locations. The vulnerability emerges because Active Directory sites can be linked to Group Policy Objects (GPOs), which control system configurations across an organization. When attackers gain write permissions to sites or their associated GPOs, they can inject malicious configurations that compromise all computers connected to those sites, including domain controllers. #cybersecuritynews #windows
Wi-Fi as a Motion Sensor
22
332
30
3,903
Martin Junge retweeted
๐Ÿฏ If you've never seen or worked with a Honeypot, watch this video. It covers how to setup almost 20+ honeypots (and visualize the data) to trap attackers. Video: piped.video/watch?v=FjZmhI_lโ€ฆ
4
98
1
714
Martin Junge retweeted
#Offensive_security #Red_Team_Tactics SID filter as security boundary between domains? Part 1 - Kerberos authentication explained - itm8.com/articles/sid-filterโ€ฆ Part 2 - Known AD attacks - from child to parent - itm8.com/articles/sid-filterโ€ฆ Part 3 - SID filtering explained - itm8.com/articles/sid-filterโ€ฆ Part 4 - Bypass SID filtering research - itm8.com/articles/sid-filterโ€ฆ Part 5 - Golden GMSA trust attack - from child to parent - itm8.com/articles/sid-filterโ€ฆ Part 6 - Schema change trust attack - from child to parent - itm8.com/articles/sid-filterโ€ฆ Part 7 - Trust account attack - from trusting to trusted - itm8.com/articles/sid-filterโ€ฆ // In part 1, we explain everything you need to know about the underlying Kerberos authentication mechanisms to understand the attacks, defenses, and research in the rest of the series. Part 2 reviews known methods of escalating from a child domain to a parent domain. Part 3 describes known methods for preventing attacks using SID filtering. Part 4-7 describe our research findings and novel trust attacks
1
27
98
Martin Junge retweeted
Penetration testing platform using multiple AI models
Ever looked at your local Administrators group and wondered who those random SIDs belong to? Windows finally shows Entra roles and groups with their actual names. No more guessing, no more unreadable entries. See how it works in the latest Patch n Rant episode: piped.video/tiTqGrnL6K8 #Intune #MSIntune #Windows11 #Entra #Windows
Martin Junge retweeted
๐Ÿ”’ Secure Bits ๐Ÿ’ก Have you ever heard of ๐—˜๐—ฆ๐—– ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€? I guess you have. If you're running ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€ (๐—”๐—— ๐—–๐—ฆ) and haven't audited it for ESC misconfigurations โ€” you may be sitting on a ๐˜๐—ถ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ถ๐—บ๐—ฒ ๐—ฏ๐—ผ๐—บ๐—ฏ.ย ๐Ÿ’ฃ ๐ŸŽฏ ESC vulnerabilities (Enterprise PKI Escalation Paths) are incredibly ๐—ฐ๐—ผ๐—บ๐—บ๐—ผ๐—ปย and highly ๐—ฑ๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟ๐—ผ๐˜‚๐˜€. Yetโ€ฆ most environments I assess treat AD CS like a black box โ€” โ€œItโ€™s working, so letโ€™s not touch it.โ€ But attackers love AD CS โ€” it often lets them ๐—ฒ๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ฒ ๐˜๐—ผ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป using just a basic user account. No exploits. Just misconfigurations. ๐—Ÿ๐—ฒ๐˜โ€™๐˜€ ๐—ฏ๐—ฟ๐—ฒ๐—ฎ๐—ธ ๐—ฑ๐—ผ๐˜„๐—ป ๐—˜๐—ฆ๐—–๐Ÿญย ๐Ÿ‘‡ ESC1 = Certificate Template Misconfig It lets a regular user request a certificate that can later be used to authenticate as someone else โ€” including privileged users. ๐—ง๐—ผ ๐—ฏ๐—ฒ ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—น๐—ฒ, ๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐˜€๐—ฒ ๐—ฎ๐—ฟ๐—ฒ ๐˜๐—ฟ๐˜‚๐—ฒ: โœ… Non-privileged users can enroll in a certificate template โœ… Manager approval is not required โœ… No authorized signature is required โœ… The template supports client authentication (PKINIT, Smart Card, etc.) โœ… The requester can define the Subject Alternative Name (SAN) ๐—˜๐—ป๐—ฑ ๐—ฟ๐—ฒ๐˜€๐˜‚๐—น๐˜? A low-privileged user can impersonate anyone โ€” including a Domain Admin โ€” using the certificate. ๐Ÿ› ๏ธ ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฐ๐—ต๐—ฒ๐—ฐ๐—ธ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜: There are free tools for this: ๐Ÿ”น ADProbe โ€” My AD vulnerability scanner ๐Ÿ”น Locksmith by Jake Hildreth โ€” covers almost all ESC vulnerabilities ๐Ÿ”น ... ๐ŸŽฏ There are ๐Ÿญ๐Ÿฒ ๐—˜๐—ฆ๐—–๐˜€ ๐—ถ๐—ป ๐˜๐—ผ๐˜๐—ฎ๐—น. Iโ€™ll be covering them in upcoming Secure Bits posts. ๐Ÿ‘‰ Did you already know what ESC1 was about? #ADCS #SecureBits #CyberSecurity #ActiveDirectory #RedTeam #BlueTeam #PKI #WindowsSecurity #HorizonSecured @BlueTeamDave
1
29
119
Martin Junge retweeted
FREE MCP Security Fundamentals Course apisecuniversity.com/coursesโ€ฆ
If youโ€™re threat hunting in Windows, these Event IDs are your goldmine. ๐Ÿ’Ž From failed logons to PowerShell abuse & privilege escalation, knowing which logs matter most can slice your investigation time in half. โšก ๐Ÿ“Œ Pro tip: Correlate multiple Event IDs; attackers never leave just one breadcrumb. #SOC #DFIR #ThreatHunting #CyberDefenders
6
43
1
281
Martin Junge retweeted
Hides any file inside a PNG image
20
108
5
1,354
Martin Junge retweeted
Turn any GitHub repository into rich, navigable docs. Simply replace "github" with "deepwiki" in the repo URL.
The Intune MDM Device Certificate and its renewalโ€ฆ Next year (around 03/04 of 2026) every single Intune MDM certificate will need renewal. Yes, all of them!!!!!!! Why? Because the Microsoft Intune Root Certification Authority is expiring. Iโ€™m marking that date in my calendar, because if even 10% of all Intune-managed devices miss that renewal (which they will because of reasons I am asked to look at now)โ€ฆ weโ€™re in for one massive shitshow. Why? If the certificate is not renewed, the device would lose communication with Intune.... The only solution is to reenroll! Where is the Microsoft announcement? @IntuneSuppTeam ???? #Intune #MSIntune #Windows #Windows11