Pentester's Promiscuous Notebook
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2
    • Infrastructure
      • AD
        • ACL Abuse
        • AD CS Abuse
        • ADIDNS Abuse
        • Attack Trusts
        • Attack RODCs
        • AV / EDR Evasion
        • Authentication Coercion
        • Credentials Harvesting
          • From Memory
          • Credential Phishing
          • DCSync
          • DPAPI
          • KeePass
          • Linux
          • LSA
          • NetSync
          • NPLogonNotify
          • NTDS
          • Password Filter
          • RDP
          • SAM
          • SSH Clients
          • SSPI
        • Discovery
        • DnsAdmins
        • Dominance
        • gMSA / dMSA
        • GPO Abuse
        • Kerberos
        • Key Credentials Abuse
        • LAPS
        • Lateral Movement
        • LDAP
        • NTLM
        • Password Spraying
        • Post Exploitation
        • Pre-created Computers Abuse
        • PrivExchange
        • Privileges Abuse
        • RID Cycling
        • SCCM Abuse
        • SMB
        • Token Manipulation
        • User Hunt
        • WSUS
        • Zerologon
      • Azure AD
      • DevOps
      • DBMS
      • Authentication Brute Force
      • File Transfer
      • IPMI
      • Kiosk Breakout
      • Low-Hanging Fruits
      • LPE
      • Networks
      • NFS
      • Persistence
      • Pivoting
      • Post Exploitation
      • SNMP
      • SSH
      • TFTP
      • VNC
    • OSINT
    • Password Brute Force
    • Perimeter
    • Shells
    • Web
    • Wi-Fi
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Development
  • 🐞Exploit Dev
    • BOF
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linux
    • Networking
    • Virtualization
    • Windows
Powered by GitBook
On this page
  • Fake TGT Delegation
  • Internal Monologue
  • RemoteMonologue
  • GSSAPI Abuse
  1. ⚒️Pentest
  2. Infrastructure
  3. AD
  4. Credentials Harvesting

SSPI

Security Support Provider Interface

Fake TGT Delegation

  • https://github.com/gentilkiwi/kekeo/blob/d3ee2ae2fdeb5581fe2be1d53838f66729c3de16/kekeo/modules/kuhl_m_tgt.c

  • https://github.com/GhostPack/Rubeus#tgtdeleg

  • https://github.com/GhostPack/Rubeus/blob/0e57072d27c242fa503d2d3a8b5e3ddb3373cc06/Rubeus/lib/LSA.cs

  • https://github.com/ly4k/Certipy/blob/2780d5361121dd4ec79da3f64cfb1984c4f779c6/certipy/lib/sspi/kerberos.py

  • https://xakep.ru/2023/06/14/tgt-delegation/

  • https://github.com/MzHmO/articles/tree/main/TGT%20Deleg

  • https://swarm.ptsecurity.com/python-sspi-teaching-impacket-to-respect-windows-sso/

  • https://gist.github.com/snovvcrash/ff867dbd922ff2c36f480c0a61819f29

Internal Monologue

  • https://eladshamir.com/2018/03/19/Internal-Monologue.html

  • https://github.com/eladshamir/Internal-Monologue

  • https://xakep.ru/2023/12/08/sspi-hack/

  • https://github.com/MzHmO/NtlmThief

RemoteMonologue

  • https://www.ibm.com/think/x-force/remotemonologue-weaponizing-dcom-ntlm-authentication-coercions

  • https://github.com/3lp4tr0n/RemoteMonologue

GSSAPI Abuse

  • https://www.pentestpartners.com/security-blog/a-broken-marriage-abusing-mixed-vendor-kerberos-stacks/

  • https://github.com/CCob/gssapi-abuse

Last updated 6 months ago