It is quite common to identify MSSQL instances in Active Directory environments, due to the easy integration with LDAP and respective authentication mechanisms, so these deployed instances can provide an attacker with different ways to obtain information or some way to compromise internal servers. In this post I will explain Continue Reading
RT – NTLM Relay and Coerce authentication, practical scenarios
I have come across many times, in real scenarios, certain configurations in the domain that allow an attacker to gain control over certain computers and servers under the following conditions: The last two points are not under the attacker’s control, they are configurations that are already defined in a domain Continue Reading