Про принудительную аутентификацию Windows в 2025 году
https://blog.redteam-pentesting.de/2025/windows-coercion/
Вместе с постом несколько скриптов:
Софт wspcoerce: https://github.com/RedTeamPentesting/wspcoerce
Модуль NetExec efsr_spray: https://github.com/Pennyw0rth/NetExec/pull/718
ntlmrelayx RPC server and EPM: https://github.com/fortra/impacket/pull/1974
#ad #coerce #pentest #redteam
https://blog.redteam-pentesting.de/2025/windows-coercion/
Вместе с постом несколько скриптов:
Софт wspcoerce: https://github.com/RedTeamPentesting/wspcoerce
Модуль NetExec efsr_spray: https://github.com/Pennyw0rth/NetExec/pull/718
ntlmrelayx RPC server and EPM: https://github.com/fortra/impacket/pull/1974
#ad #coerce #pentest #redteam
RedTeam Pentesting - Blog
The Ultimate Guide to Windows Coercion Techniques in 2025
Windows authentication coercion often feels like a magic bullet against the average Active Directory. With any old low-privileged account, it usually allows us to gain full administrative access to almost arbitrary Windows workstations and servers, …
🔥22👍8😢1