<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>zyn3rgy.io</title><link>https://zyn3rgy.io/</link><description>Recent content on zyn3rgy.io</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Tue, 25 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://zyn3rgy.io/index.xml" rel="self" type="application/rss+xml"/><item><title>LdapRelayScan</title><link>https://zyn3rgy.io/tools/ldaprelayscan/</link><pubDate>Sun, 16 Jan 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/ldaprelayscan/</guid><description>&lt;p&gt;Checks whether Domain Controllers enforce LDAP channel binding and LDAP server signing requirements — two key protections against NTLM relay attacks targeting LDAP/S. LDAPS channel binding can be checked unauthenticated; LDAP signing checks require valid domain credentials. Supports Docker deployment and SOCKS proxy for use through C2.&lt;/p&gt;</description></item><item><title>smbtakeover</title><link>https://zyn3rgy.io/tools/smbtakeover/</link><pubDate>Thu, 01 Aug 2024 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/smbtakeover/</guid><description>&lt;p&gt;Unbinds and rebinds 445/tcp on Windows without loading a driver, injecting a module into LSASS, or rebooting the host — easing SMB-based NTLM relay operations over C2. Available as both a Python implementation and a Beacon Object File (BOF), using RPC over TCP to interact with the Server Service.&lt;/p&gt;</description></item><item><title>RelayInformer</title><link>https://zyn3rgy.io/tools/relayinformer/</link><pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/relayinformer/</guid><description>&lt;p&gt;Determines Extended Protection for Authentication (EPA) enforcement levels of popular NTLM relay targets from an offensive perspective. Helps inform relay setup by identifying services where EPA could block relay attacks. Available as both Python and BOF implementations.&lt;/p&gt;</description></item><item><title>ClickonceHunter</title><link>https://zyn3rgy.io/tools/clickoncehunter/</link><pubDate>Fri, 14 Oct 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/clickoncehunter/</guid><description>&lt;p&gt;A web scraper that uses chromedp and HTTP requests to find published ClickOnce applications via Google and Swisscows search engines. Supports AWS API Gateway IP rotation to avoid rate limiting and HTTP proxy for routing traffic.&lt;/p&gt;</description></item><item><title>ecp_slap</title><link>https://zyn3rgy.io/tools/ecp-slap/</link><pubDate>Fri, 23 Oct 2020 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/tools/ecp-slap/</guid><description>&lt;p&gt;Scans and exploits CVE-2020-0688 on on-premises Exchange servers. Includes three functions: scan (cookie extraction + version check), generate (ysoserial payload creation), and exploit (authenticated remote code execution via deserialization).&lt;/p&gt;</description></item><item><title>Less Praying More Relaying - Enumerating EPA Enforcement for MSSQL and HTTPS</title><link>https://zyn3rgy.io/posts/less-praying-more-relaying-enumerating-epa-enforcement-for-mssql-and-https/</link><pubDate>Tue, 25 Nov 2025 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/posts/less-praying-more-relaying-enumerating-epa-enforcement-for-mssql-and-https/</guid><description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;&lt;/em&gt; – &lt;em&gt;It&amp;rsquo;s important to know if your NTLM relay will be prevented by integrity protections such as EPA, before setting up for and attempting the attack. In this post, we share how to solve this problem for additional protocols (MSSQL and HTTP), as well as publish &lt;a href="https://github.com/zyn3rgy/relayinformer"&gt;RelayInformer tools&lt;/a&gt; to automate the solution.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id="problem-statement"&gt;Problem Statement&lt;/h2&gt;
&lt;p&gt;NTLM relays can be challenging and time consuming to conduct, especially when the relay is taking place over command and control (C2). There are plenty of variables to worry about between setup, coercion, tunnels, and traffic redirection. All that setup and headache could be for naught if Extended Protection for Authentication (EPA) is configured to protect the target service.&lt;/p&gt;</description></item><item><title>Introducing RelayInformer: Identifying EPA Enforcement for Multiple Protocols</title><link>https://zyn3rgy.io/presentations/2025-introducing-relayinformer/</link><pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/2025-introducing-relayinformer/</guid><description/></item><item><title>Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover</title><link>https://zyn3rgy.io/posts/relay-your-heart-away-an-opsec-conscious-approach-to-445-takeover/</link><pubDate>Thu, 01 Aug 2024 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/posts/relay-your-heart-away-an-opsec-conscious-approach-to-445-takeover/</guid><description>&lt;p&gt;Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after all these years of abuse. Leveraging several of these NTLM relay primitives, specifically ones that require coercing SMB-based authentication, come with additional challenges to overcome while operating over command and control (C2). This technique will ease the abuse of several popular NTLM relay primitives by allowing attackers to control inbound 445/tcp traffic without loading a driver, loading a module into LSASS, or requiring a reboot of the target Windows machine.&lt;/p&gt;</description></item><item><title>Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover</title><link>https://zyn3rgy.io/presentations/troopers-2024-relay-your-heart-away/</link><pubDate>Thu, 13 Jun 2024 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/troopers-2024-relay-your-heart-away/</guid><description/></item><item><title>Relay Your Heart Away: An OPSEC-Conscious Approach to 445 Takeover</title><link>https://zyn3rgy.io/presentations/x33fcon-2024-relay-your-heart-away/</link><pubDate>Thu, 06 Jun 2024 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/x33fcon-2024-relay-your-heart-away/</guid><description/></item><item><title>Sideloading Serenade: A Symphony Of .NET Payload Techniques</title><link>https://zyn3rgy.io/presentations/blackalps-2023-sideloading-serenade/</link><pubDate>Thu, 09 Nov 2023 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/blackalps-2023-sideloading-serenade/</guid><description/></item><item><title>Sideloading Serenade: A Symphony Of .NET Payload Techniques</title><link>https://zyn3rgy.io/presentations/texas-cyber-summit-2023-sideloading-serenade/</link><pubDate>Thu, 19 Oct 2023 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/texas-cyber-summit-2023-sideloading-serenade/</guid><description/></item><item><title>Less SmartScreen More Caffeine: Abusing ClickOnce for Trusted Code Execution</title><link>https://zyn3rgy.io/posts/less-smartscreen-more-caffeine-abusing-clickonce-for-trusted-code-execution/</link><pubDate>Wed, 07 Jun 2023 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/posts/less-smartscreen-more-caffeine-abusing-clickonce-for-trusted-code-execution/</guid><description>&lt;p&gt;The contents of this post were written by Nick Powers (&lt;a href="https://twitter.com/zyn3rgy"&gt;@zyn3rgy&lt;/a&gt;) and Steven Flores (&lt;a href="https://twitter.com/0xthirteen"&gt;@0xthirteen&lt;/a&gt;), and is a written version of the content &lt;a href="https://www.youtube.com/watch?v=cyHxoKvD8Ck"&gt;presented at Defcon30&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;With the barrier to entry for initial access ever increasing, we spent some time digging into potentially lesser-known weaponization options for ClickOnce deployments. A few of the hurdles we&amp;rsquo;d like to overcome by implementing these weaponization options include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Install / execute application without administrative privileges&lt;/li&gt;
&lt;li&gt;Reputable, known-good file(s) used during execution&lt;/li&gt;
&lt;li&gt;Streamlined, minimal user interaction required&lt;/li&gt;
&lt;li&gt;Ease of rerolling execution implementations&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Ultimately, we want to take a relatively common initial access technique known as ClickOnce and extend its value for the offensive use case by abusing the trust of third-party applications.&lt;/p&gt;</description></item><item><title>Bypass Client Side Posture Checks w/ Patching and Hooking</title><link>https://zyn3rgy.io/presentations/bsides-austin-2023-bypass-client-side-posture/</link><pubDate>Sat, 22 Apr 2023 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/bsides-austin-2023-bypass-client-side-posture/</guid><description/></item><item><title>Less SmartScreen More Caffeine: ClickOnce (Ab)Use for Trusted Code Execution</title><link>https://zyn3rgy.io/presentations/wwhf-2022-clickonce/</link><pubDate>Thu, 27 Oct 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/wwhf-2022-clickonce/</guid><description/></item><item><title>Less SmartScreen More Caffeine: ClickOnce (Ab)Use for Trusted Code Execution</title><link>https://zyn3rgy.io/presentations/defcon30-2022-clickonce/</link><pubDate>Fri, 12 Aug 2022 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/presentations/defcon30-2022-clickonce/</guid><description/></item><item><title>Proxy Windows Tooling via SOCKS</title><link>https://zyn3rgy.io/posts/proxy-windows-tooling-via-socks/</link><pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate><guid>https://zyn3rgy.io/posts/proxy-windows-tooling-via-socks/</guid><description>&lt;p&gt;Leveraging SOCKS to proxy tools from a Windows attacker machine through a compromised host is a topic that contains some nuance and room for confusion. This nuance stems from protocol requirements of common network traffic being proxied into a target network, as well as the tools (or lack thereof) available for Windows to facilitate proxying network traffic via SOCKS. However, there is significant value in the ability to proxy existing Windows tools and native utilities into a network from an offensive perspective. To that end, this post aims to step through:&lt;/p&gt;</description></item></channel></rss>