Andrea P's Avatar

Andrea P

@decoder-it.bsky.social

274 Followers  |  5 Following  |  16 Posts  |  Joined: 11.11.2024  |  1.5166

Latest posts by decoder-it.bsky.social on Bluesky

Preview
From NTLM relay to Kerberos relay: Everything you need to know While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and …

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️
decoder.cloud/2025/04/24/f...

28.04.2025 08:04 — 👍 8    🔁 3    💬 1    📌 0
Post image

Hey, we should really switch from NTLM to something like Kerberos, yet another good reason, right?
🤣😂

26.03.2025 18:22 — 👍 6    🔁 1    💬 0    📌 0
Preview
GitHub - decoder-it/KrbRelayEx-RPC Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.

KrbRelayEx-RPC tool is out! 🎉
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
github.com/decoder-it/K...

14.03.2025 10:18 — 👍 9    🔁 10    💬 0    📌 0
Preview
GitHub - decoder-it/NewMachineAccount Contribute to decoder-it/NewMachineAccount development by creating an account on GitHub.

Another simple standalone tool for creating machine accounts with custom password in Windows AD
github.com/decoder-it/N...

25.02.2025 20:27 — 👍 9    🔁 4    💬 0    📌 0

Notes from the Field: My journey in trying to change Windows password in the most complex way, purely for fun, very little profit, but definitely a fun challenge! More details here ➡️https://decoder.cloud/2025/02/11/changing-windows-passwords-in-the-most-complex-way/

11.02.2025 17:46 — 👍 1    🔁 0    💬 0    📌 0
Preview
The (Almost) Forgotten Vulnerable Driver Vulnerable Windows drivers remain one of the most exploited methods attackers use to gain access to the Windows kernel. The list of known vulnerable drivers seems almost endless, with some not even…

Had some fun reviving an old vulnerable driver, read all about it here: decoder.cloud/2025/01/09/t... 🤠

09.01.2025 11:37 — 👍 5    🔁 3    💬 0    📌 0

Indeed, it is. An interesting attack surface is the Kerberos relay, as it allows control over the hostname. In this particular example, I'm relaying RPC/DCOM (bsky.app/profile/deco...) but it also works when acting as an SMB or WinRM server.

23.12.2024 10:35 — 👍 4    🔁 0    💬 1    📌 0
Post image

Working in it .... 😇

www.youtube.com/watch?v=fUqC...

13.12.2024 19:49 — 👍 6    🔁 3    💬 0    📌 1

@decoder-it.bsky.social and i noticed that it's no more possible to call NtLoadDriver pointing to an unprivileged regkey such as \REGISTRY\USER
Even if you have the SeLoadPrivilege you would still require the Admin group to write the required regkey.
Some more technical details below 👇

13.12.2024 16:11 — 👍 3    🔁 3    💬 1    📌 0

ISystemActivator

02.12.2024 18:39 — 👍 0    🔁 0    💬 0    📌 0
Post image

Relaying DCOM has always intrigued me, so I decided to dive in. Started with a MiTM attack using a fake DNS entry, targeting certificate requests to an ADCS server and relaying to SMB.

29.11.2024 21:42 — 👍 9    🔁 4    💬 1    📌 0

ood luck with early detection 😉. Personally, I'd focus time and effort on the basics of hardening (the ones I listed before) prevention often beats detection in the long run.

28.11.2024 17:24 — 👍 0    🔁 0    💬 1    📌 0

As usual it's all about preventing relaying. So yes, always require SMB signing, LDAP/LDAPS signing and Channel Binding, HTTPS Extended Authentication Protection... but this in an ideal world, and I've see too often Insecure DNS Update allowed on root zones... 🤷‍♂️

25.11.2024 20:53 — 👍 3    🔁 0    💬 1    📌 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

25.11.2024 17:31 — 👍 64    🔁 43    💬 3    📌 0
Post image

Following my prev tweet, my Kerberos MITM relay/forwarder is almost finished! It targets for example insecure DNS updates in AD, allowing DNS name forgery. It intercepts, relays, and forwards traffic, with the client unaware. Currently supporting smb->smb and smb->http (adcs)

20.11.2024 11:21 — 👍 36    🔁 14    💬 1    📌 0

I will need your help ;)

17.11.2024 20:11 — 👍 2    🔁 0    💬 0    📌 0
Post image

Working on my "new" Kerberos Relay & PortForwarder tool designed for managing also MITM attacks 😇

17.11.2024 15:39 — 👍 11    🔁 1    💬 1    📌 0

@decoder-it is following 5 prominent accounts