Yantra Manav – A wormable SSH bot

Sometime back i came across a blog post on FritzFrog botnet which was targeting SSH servers. I was very much inspired after reading the blog post and thought why not create my own version of wormable SSH bot similar to FritzFrog. This blog post is purely based on my learning process on creating and emulating… Continue reading Yantra Manav – A wormable SSH bot

Malicious use of Microsoft LAPS

LAPS Overview: LAPS (Local Administrator Password Solution) is a tool for managing local administrator passwords for domain joined computers. It stores passwords/secrets in a confidential attribute in the computer’s corresponding active directory object. LAPS eliminates the risk of lateral movement by generating random passwords of local administrators. LAPS solution is a Group Policy Client Side… Continue reading Malicious use of Microsoft LAPS

Tales of a Rogue Domain Controller – The DCShadow Attack

Background: DCShadow is a post exploitation attack, the authors call this as the domination concept. The DCShadow attack was demonstrated by Vincent Le Toux and Benjamin Delpy at Blue Hat 2018. DCShadow attack abuses Directory Replication Service (DRS) Remote Protocol [MS-DRSR] and Active Directory Technical specification [MS-ADTS]. The DCShadow attack allows an attacker with appropriate… Continue reading Tales of a Rogue Domain Controller – The DCShadow Attack

Leaking windows Credentials via Microsoft Office Document

This blog post is based on “Tradecraft Security Weekly Talk EP 21” given by @dafthack and @ustayready from Black Hills Information Security. Microsoft word document “DOCX” file is an ZIP archive of XML files. These XML documents controls the Theme,Fonts and web settings of the document. Historically Word document used to be HTML editor. we… Continue reading Leaking windows Credentials via Microsoft Office Document