slkjfkasfds

Results 23 comments of slkjfkasfds
trafficstars

Update 221012. Akamai Security did apparently find a [coercing vulnerability in SMB over QUIC in April](https://www.akamai.com/blog/security/authentication-coercion-windows-server-service). They have now released [this POC](https://github.com/akamai/akamai-security-research/tree/main/PoCs/cve-2022-30216) for exploiting that. However, MS patched the vulnerability...

Strange... Why does it fail for me then? I tested again using a different account and this time I tried to revoke "IncreaseWorkingSet" instead. Your tool attempts to yet again...

Hi, Is the error you get by any chance [this](https://github.com/Hackndo/pyGPOAbuse/issues/6)? That would explain a lot for me.

**Suggestion** On every attack, the file "cleaning/to_clean.txt" is overwritten. This means that the values from previous attacks are lost forever. Configuration for earlier abused GPOs can no longer be restored....

Hi, I am trying to abuse a bidirectional inter-forest trust using the inter-trust account (trust key). SID history and SID filtering is disabled in both directions. After having successfully requested...

Thank you for your reply! Regarding SID filtering/SID history. According to [this site](https://www.thehacker.recipes/ad/movement/trusts#sid-filtering) some attacks should work depending on the status of these settings. In my lab they are both...

I enabled SID history from the forest adlab.local to the forest adlab2.local but DCSyncing still failed with the same error. However, once I made the custom group [email protected] a member...

> Hi, @jsdhasfedssad, how can I get in touch with you? I'd like to discuss this issue with you Hi. How about this? https://y99.in/r/935588

> > > Hi, @jsdhasfedssad, how can I get in touch with you? I'd like to discuss this issue with you > > > > > > Hi. How about...

Hi, I also get the error `msv_exception` using Pypykatz 0.6.11. I got the dump from a domain-joined Windows 11 24H2 26100.6584 Enterprise which had the registry key RunAsPPL set to...