Clément Labro's Avatar

Clément Labro

@itm4n.bsky.social

Pentest & Windows security research

420 Followers  |  58 Following  |  15 Posts  |  Joined: 18.08.2023  |  1.5434

Latest posts by itm4n.bsky.social on Bluesky

Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.

Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.

🆕 New blog post!

"Offline Extraction of Symantec Account Connectivity Credentials (ACCs)"

Following my previous post on the subject, here is how to extract ACCs purely offline.

👉 itm4n.github.io/offline-extr...

#redteam #pentesting

15.06.2025 16:33 — 👍 10    🔁 4    💬 3    📌 0
Sample output of PrivescCheck showing the information collected about the Symantec Management Agent (SMA).

Sample output of PrivescCheck showing the information collected about the Symantec Management Agent (SMA).

🆕 New blog post!

"Checking for Symantec Account Connectivity Credentials (ACCs) with PrivescCheck"

This blog post is not so much about PrivescCheck, but rather brings additional insight to the original article published by MDSec on the subject.

👉 itm4n.github.io/checking-sym...

#redteam

11.06.2025 15:46 — 👍 8    🔁 4    💬 0    📌 0
Hijacking the Windows “MareBackup” Scheduled Task for Privilege Escalation – SCRT Team Blog

🆕 New blog post! It's a rather short one, nothing crazy. Just wanted to share a random finding I made recently. 🤷‍♂️

'Hijacking the Windows "MareBackup" Scheduled Task for Privilege Escalation'

👉 blog.scrt.ch/2025/05/20/h...

#pentest #pentesting #redteam #windows #privilegeescalation

28.05.2025 07:08 — 👍 8    🔁 5    💬 0    📌 0
Preview
Automating MS-RPC vulnerability research Diving into the MS-RPC protocol and how to automate vulnerability research using a fuzzing approach.

This blog post brings automated Windows RPC research to the next level! 🔥

www.incendium.rocks/posts/Automa...

The writing quality is also excellent. 📝

#windows #research

23.05.2025 11:59 — 👍 8    🔁 2    💬 0    📌 0
Post image

Another example of a Windows 0-day found with PrivescCheck. Congrats to Compass Security for investigating the issue and exploiting it. 👏

blog.compass-security.com/2025/04/3-mi...

15.04.2025 12:41 — 👍 15    🔁 6    💬 1    📌 0

You're absolutely right! 😬
Thanks for your message. I'll do that. 🙂
This whole DLL thing is essentially a dirty hack anyway.

20.02.2025 08:56 — 👍 1    🔁 0    💬 0    📌 0
Screenshot showing the execution of the proof-of-concept named PowerChell in comparison to a typical PowerShell prompt. In particular, it shows that PowerChell is able to bypass the Constrained Language Mode (CLM).

Screenshot showing the execution of the proof-of-concept named PowerChell in comparison to a typical PowerShell prompt. In particular, it shows that PowerChell is able to bypass the Constrained Language Mode (CLM).

In this blog post, I explain how I was able to create a PowerShell console in C/C++, and disable all its security features (AMSI, logging, transcription, execution policy, CLM) in doing so. 💪

👉 blog.scrt.ch/2025/02/18/r...

19.02.2025 09:13 — 👍 43    🔁 20    💬 2    📌 2
Windows Bug Class: Accessing Trapped COM Objects with IDispatch Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...

New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...

30.01.2025 18:37 — 👍 66    🔁 42    💬 2    📌 0
Preview
Process Hollowing on Windows 11 24H2 Process Hollowing (a.k.a. RunPE) is probably the oldest, and the most popular process impersonation technique (it allows to run a malicious executable under the cover of a benign process). It is us…

In case if you wonder what broke #ProcessHollowing on Windows 11 24H2, I have something for you: hshrzd.wordpress.com/2025/01/27/p...

26.01.2025 23:55 — 👍 58    🔁 39    💬 0    📌 1
Preview
Windows BitLocker -- Screwed without a Screwdriver Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only

Really great blog post about bypassing BitLocker using "PXE soft reboot" (even if PXE boot is disabled in the BIOS).

"Windows BitLocker -- Screwed without a Screwdriver"

👉 neodyme.io/en/blog/bitl...
👉 media.ccc.de/v/38c3-windo...

20.01.2025 10:03 — 👍 15    🔁 7    💬 1    📌 0
Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

Diagram representing the various Windows Point and Print configurations that reintroduce the PrintNightmare exploit variants.

I updated the diagram representing the different Point and Print configurations and their exploitation on my blog.

Hopefully, this should provide a better understanding of the whole "PrintNightmare" situation to both defenders and red teamers. 🤞

04.12.2024 17:42 — 👍 18    🔁 8    💬 0    📌 0
August 13, 2024—KB5041585 (OS Builds 22621.4037 and 22631.4037) - Microsoft SupportYour Privacy Choices Opt-Out Icon

Interestingly enough, MS disabled the "Use my Windows user account" checkbox when connecting to Wi-Fi on the lock screen to address CVE-2024-38143 in the August Patch Tuesday.

This change completely remediates the "Airstrike" attack as well. 🤯

support.microsoft.com/en-us/topic/...

03.12.2024 20:45 — 👍 1    🔁 2    💬 0    📌 0
Post image

I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...

25.11.2024 17:31 — 👍 64    🔁 43    💬 3    📌 0

Thanks!
Yes, I already thought about doing something like this, and I already took a look at cross-references to find the offset of the object. I didn't take the time to check older versions though, there might be some diffs to take into consideration. There is clearly more to work on. :)

13.11.2024 08:22 — 👍 1    🔁 0    💬 0    📌 0
Exploiting KsecDD through Server Silos – SCRT Team Blog

🆕 New blog post! "Exploiting KsecDD through Server Silos"

In my latest mini research project, I've been working with my teammate @PMa1n (X) on extending the work of @floesen_ (X) on the KsecDD driver. I'm thrilled to finally share the results.

👉 blog.scrt.ch/2024/11/11/e...

11.11.2024 13:40 — 👍 12    🔁 7    💬 1    📌 0
A trick, the story of CVE-2024-26230

"A Trick, The Story of CVE-2024-26230" by k0shl

Write-up about the discovery and exploitation of a UAF vulnerability in the Windows Telephony service + CFG bypass leading to local privilege escalation. 🔥🔥🔥

whereisk0shl.top/post/a-trick...

10.04.2024 18:57 — 👍 3    🔁 0    💬 0    📌 0
Preview
GitHub - itm4n/PrivescCheck: Privilege Escalation Enumeration Script for Windows Privilege Escalation Enumeration Script for Windows - itm4n/PrivescCheck

🆕​ New PrivescCheck extended check!

ℹ️​ The script can now enumerate dangerous default file extension associations, such as '.bat' or '.wsh'.

⚠️​ A manual review of the result is always recommended, but for the most part, it should be fine.

github.com/itm4n/Prives...

11.03.2024 20:29 — 👍 4    🔁 2    💬 0    📌 0
Preview
Extracting PEAP Credentials from Wired Network Profiles A colleague of mine recently found himself in a situation where he had physical access to a Windows machine connected to a wired network using 802.1X and saved user credentials for the authentication....

​🆕 New blog post! "Extracting PEAP Credentials from Wired Network Profiles"

ℹ️​ Nothing new under the sun, you might think?! Well, think twice, because this seemingly trivial task took an unexpected turn.

👉 itm4n.github.io/peap-credent...

26.02.2024 07:33 — 👍 4    🔁 0    💬 0    📌 0

@itm4n is following 20 prominent accounts