Pentester's Promiscuous Notebook
search
⌘Ctrlk
TwitterGitHubBlog
Pentester's Promiscuous Notebook
  • README
  • ⚒️Pentest
    • C2
    • Infrastructure
      • AD
        • ACL Abuse
        • AD CS Abuse
        • ADIDNS Abuse
        • Attack Trusts
        • Attack RODCs
        • AV / EDR Evasion
        • Authentication Coercion
        • Credentials Harvesting
        • Discovery
        • DnsAdmins
        • Dominance
        • gMSA / dMSA
        • GPO Abuse
        • Kerberos
          • Delegation Abuse
            • Constrained
            • Resource-based Constrained
            • Unconstrained
          • Kerberos Relay
          • Roasting
        • Key Credentials Abuse
        • LAPS
        • Lateral Movement
        • LDAP
        • NTLM
        • Password Spraying
        • Post Exploitation
        • Pre-created Computers Abuse
        • PrivExchange
        • Privileges Abuse
        • RID Cycling
        • SCCM Abuse
        • SMB
        • Token Manipulation
        • User Hunt
        • WSUS
        • Zerologon
      • Azure AD
      • DevOps
      • DBMS
      • Authentication Brute Force
      • File Transfer
      • IPMI
      • Kiosk Breakout
      • Low-Hanging Fruits
      • LPE
      • Networks
      • NFS
      • Persistence
      • Pivoting
      • Post Exploitation
      • SNMP
      • SSH
      • TFTP
      • VNC
    • OSINT
    • Password Brute Force
    • Perimeter
    • Shells
    • Web
    • Wi-Fi
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Development
  • 🐞Exploit Dev
    • BOF
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linux
    • Networking
    • Virtualization
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚒️Pentestchevron-right
  2. Infrastructurechevron-right
  3. ADchevron-right
  4. Kerberos

Delegation Abuse

  • https://www.guidepointsecurity.com/blog/delegating-like-a-boss-abusing-kerberos-delegation-in-active-directory/arrow-up-right

  • https://www.thehacker.recipes/ad-ds/movement/kerberos/delegations#theoryarrow-up-right

  • https://youtu.be/byykEId3FUs?t=2619arrow-up-right

  • https://luemmelsec.github.io/S4fuckMe2selfAndUAndU2proxy-A-low-dive-into-Kerberos-delegations/arrow-up-right

  • https://unit42.paloaltonetworks.com/next-gen-kerberos-attacks/arrow-up-right

https://github.com/ShutdownRepo/The-Hacker-Recipes/raw/master/.gitbook/assets/Insomnihack%202022%20-%20Delegating%20Kerberos%20To%20Bypass%20Kerberos%20Delegation%20Limitations.pdfgithub.comchevron-right

hashtag
CVE-2022-33679

  • https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.htmlarrow-up-right

  • https://github.com/Bdenneu/CVE-2022-33679arrow-up-right

hashtag
Tools

  • https://github.com/mtth-bfft/adelegarrow-up-right

Last updated 1 year ago

  • CVE-2022-33679
  • Tools