Our Blog
2024 (11)
2023 (19)
2022 (10)
2021 (13)
2020 (30)
2019 (10)
2018 (14)
2017 (27)
2016 (22)
2015 (17)
2014 (15)
2013 (30)
2012 (27)
2011 (33)
2010 (36)
2009 (81)
2008 (75)
2007 (80)
Categories
Categories
2024 (1)
Art (1)
Edr (3)
Lsa (1)
Registry (1)
Windows (16)
Research (76)
Sqli (1)
Lfi (1)
Industrial (1)
Network (2)
Cve (6)
Network protocol (1)
Active directory (8)
Guest (1)
Null sessions (1)
Exploit (15)
Vulnerability (4)
Webapps (18)
Cve-2024-26331 (1)
Cve-2024-28269 (1)
Web application (2)
Phishing (1)
Tool (7)
Typosquatting (1)
Ctf (5)
Training (64)
Hardware (11)
Mitm (6)
Programming (21)
Techniques (1)
Callbacks (1)
Driver (1)
Hooking (3)
Kernel (2)
Rootkit (1)
Shellcodes (1)
Ssdt (1)
Winapi (1)
Rootkits (1)
Shellcode (1)
0xcon (1)
2023 (1)
Contributions (1)
Keynote (2)
Talks (5)
Defence (2)
Bsides (3)
Cape town (1)
Law enforcement (1)
Strategy (1)
Talk (1)
Conferences (93)
Physical threats (2)
Redteam (8)
Code (2)
Experiment (3)
Perf (1)
Rust (2)
Performance (2)
Bypass (6)
Csp (1)
Reversing (18)
Av bypass (1)
Reverse engineering (3)
Blackhat (46)
Defcon (10)
Ringzer0 (1)
Browser (3)
Cache (1)
Smuggling (1)
Bug bountry (1)
Footprinting (3)
Steampipe (1)
Bugbounty (1)
Containers (1)
Docker (4)
Command injection (1)
Extensions (1)
Sensecon (5)
Teardown (1)
Hashcat (4)
Knowledge-base (1)
Tools (80)
Hash-cracking (1)
Kerberos (3)
Ntlm (2)
Delegation (1)
Protected users (1)
Bitlocker (1)
Clone (1)
Virtualisation (1)
Mallet (1)
Websockets (1)
Post-exploitation (6)
Socks (1)
Adcs (1)
Rubeus (3)
Certipy (1)
Authentication (2)
Internals (8)
Token (1)
Networking (5)
Offence (1)
Vpn (1)
Hackathon (4)
Sensecon 2022 (1)
Sensecon2022 (1)
Requestsmuggling (1)
Http2 (2)
Ibm (1)
Shell (2)
Cloud (13)
Corellium (1)
Mobile (20)
Pentest (7)
Ssh (1)
Usbfluxd (1)
Cracking (4)
Fun (61)
Sim card (1)
Android (7)
Objection (4)
Windows 11 (1)
Windows subsystem for android (1)
Wsa (1)
Wsl (1)
Challenge (5)
Sensecon 2021 (1)
Rpc (1)
Vegas (1)
Wifi (12)
Nmap (3)
Basic (1)
Infrastructure (6)
Http3 (1)
Quic (1)
Account takeover (1)
Javascript (2)
Xss (1)
Chain (1)
Ios (7)
Binary (1)
Attack (1)
Pwn (1)
Duo (1)
Games (2)
Sensecon 2020 (2)
Api (1)
Json (1)
Sensecon2020 (2)
Swagger (1)
Playstation (2)
Dual-pod-shock (1)
Dualsense (1)
Dualshock (1)
Sony (1)
Stutm (1)
Av evasion (3)
Automation (1)
Coding (1)
Forpoland (1)
Email (1)
Python (10)
Encodings (2)
Passwords (2)
0day (4)
Dll hijacking (1)
Privilege escalation (1)
Grafana (1)
Hipster (2)
Pi (1)
Pihole (1)
Traefik (1)
Acl (2)
Directaccess (1)
Kerberos resource-based constrained delegation (1)
Routopsy (1)
About:us (47)
Powershell (4)
Genericwrite (1)
Rcm (1)
Blue team (1)
Digital forensics (1)
Suricata (1)
Rce (2)
Source code review (1)
#4poland (1)
Amsi (1)
Chrome (2)
Exploit development (4)
Vulnerability research (2)
V8 (2)
Dos (1)
Monitor (1)
Poc (1)
Proofofconcept (1)
Prtg (1)
Prtg network monitor (2)
Shodan (1)
Usb (3)
Anti-virus (2)
Malware (3)
Persistence (1)
Sysmon (1)
Abuse (2)
Smartcards (1)
Windows events (1)
Forgery (1)
Impersonation (1)
Smartcard (1)
Bloodhound (1)
Dacls (1)
Mimikatz (1)
Powerview (1)
Browsers (1)
Exploitation (1)
Internal (2)
Radio (1)
Real-world (20)
Rf (2)
Shells (5)
Doom (1)
Frida (4)
Sensecon 2019 (1)
Variant analysis (1)
Code analysis (1)
Cve-2019-15937 (1)
Cve-2019-15938 (1)
Ql (1)
Semmle (1)
Metasploit (5)
Meterpreter (1)
Relay (1)
Rogue-ap (5)
Cve-2019-0547 (1)
Cve-2019-0726 (1)
Dhcp (1)
Kb4480966 (1)
Patch diffing (1)
Diffing (1)
Protocol (1)
Backdoor (3)
Lsass (1)
Password (1)
Deepdive (2)
Mac (16)
Cve-2018-19204 (1)
How-to (4)
Howto (23)
Webassembly (1)
Opsec (1)
Tin-foil-hat (8)
Command execution (1)
Dns (1)
Ioc (1)
Tunnelling (2)
Heap (7)
Heap linux (7)
Heap overflow (4)
Apngopt (2)
Exploitaion (4)
Bash (1)
Curl (1)
Efficiency (1)
Mq (1)
Detection (1)
Analysis (13)
Build-it (5)
Interception (1)
Tricks (6)
Sdr (3)
Gdb (1)
Apng (1)
Double free (2)
Linux (4)
Automated network scanner (2)
Go go go (1)
Screenshot (1)
Crypto (9)
Office (1)
Burp (1)
Certificates (2)
Skimmers (1)
Materials (5)
Pwnage friday (1)
Painless (1)
Ptmalloc2 (1)
Apache server (1)
Fuzzing (1)
Httpd (1)
Afl (1)
Cve-2017-7668 (1)
Printf (1)
Ook (1)
External (1)
Troopers (1)
Empire (3)
B-sides (5)
Presentations (9)
Dll injection (1)
Maltego (6)
Snoopy (3)
Defense (3)
Blackbox (1)
Ransomware (1)
Skype (3)
Transforms (1)
Zacon (1)
Willemluvscuddles (1)
Clickjacking (2)
Hipsterlurv (1)
Jack (1)
Ssl (1)
.za (3)
Jobs (5)
Product (4)
#legit (1)
Press release (4)
Interns (1)
Broadview (4)
Xml (1)
Malware analysis (1)
44con (6)
Show-off (1)
Z-force (1)
Z-wave (1)
Infosec-soapies (26)
Local (8)
Silly-yammerings (21)
Google (1)
Memory analysis (1)
Privacy (7)
Community (21)
Surveillance (1)
Solution (1)
Rsa (1)
Secureid (1)
Crest (1)
Sap (2)
Threat modelling (6)
Rambling (2)
Uk (2)
Zaprize (2)
Auditors (1)
Metrics (3)
Risk management (2)
Vendors (7)
Metricon (2)
Report-info (1)
Uncon (2)
Windows phone (1)
Auctions (1)
Penny (1)
Pickle (4)
Consulting (1)
Policy (1)
Ccdcoe (1)
Estonia (1)
.ac.za (1)
Vulnerability management (10)
Travel (2)
Suru (1)
Memcached (2)
Management (1)
Risk (1)
Proxy (1)
Hackrack (2)
Goodbye (1)
Fail (3)
Imsojaded (2)
Pci (2)
Videos (6)
Hope? (2)
Wasc (1)
Security-news (6)
Mindless-politics (4)
Security-fyi (8)
Qo[w|m|?] (4)
Time-waster (6)
Tech-toys (3)
Zen-hacking (3)
Foos (1)
Readme (1)
Web_x.0 (2)
Mindmaps (1)
Writing-advice (1)
Close
Chaining multiple techniques and tools for domain takeover using RBCD
Reading time: ~27 min
Posted by Sergio Lazaro on 09 March 2020
Categories:
Active directory
,
Internals
,
Bloodhound
,
Dacls
,
Mimikatz
,
Powerview
,
Rubeus
Intro In this blog post I want to show a simulation of a real-world Resource Based Constrained Delegation attack scenario...