Skip to main content

Nick Powers @zyn3rgy

> Research, learnings, and ramblings from someone cosplaying an offensive security professional

Recent Posts

Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover

Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. This technique eases the abuse of several popular NTLM relay primitives by allowing attackers to control inbound 445/tcp traffic without loading a driver, loading a module into LSASS, or requiring a reboot of the target Windows machine.

Proxy Windows Tooling via SOCKS

Leveraging SOCKS to proxy tools from a Windows attacker machine through a compromised host is a topic that contains some nuance and room for confusion. This nuance stems from protocol requirements of common network traffic being proxied into a target network, as well as the tools (or lack thereof) available for Windows to facilitate proxying network traffic via SOCKS.

Recent Presentations

Tools

Check for LDAP protections regarding the relay of NTLM authentication

BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions

Python and BOF utilities to determine EPA enforcement levels of popular NTLM relay targets

Golang search engine scraper intended for identification of published ClickOnce deployments