A bit late to the party (didn’t realize Mirage was already retired), but here’s my approach to exploite NTLM cross-session relay and ADCS ESC10 in my HTB Mirage writeup:
medium.com/@cravateroug...
A bit late to the party (didn’t realize Mirage was already retired), but here’s my approach to exploite NTLM cross-session relay and ADCS ESC10 in my HTB Mirage writeup:
medium.com/@cravateroug...
Just pushed a new feature in bloodyAD v2.5.0 for 'get writable': you can now dump the results straight into a minimal BloodHound zip using --bh
Give it a spin and let me know what breaks 😄
For all the CTF fans who don't want to manually exploit long and easy AD privesc paths, autobloody has been finally updated to its 1.0.0 version
Explore the AD DS even more using MSLDAP operations with bloodyAD 2.3.1:
"bloodyad [<auth_info>] msldap <msldap_command>"
MSLDAP commands list:
github.com/CravateRouge...
Struggling with cross-domain Kerberos? Not anymore, no matter the number of hops with kerbad v0.5.5 + bloodyAD v2.1.27:
www.linkedin.com/feed/update/...
Finally a bloodhound collector inter-domain in bloodyAD v2.1.25!
Thanks to the amazing work of @Skelsec (don't hesitate to support his project octopwn) and some custom code of mine named the reacher to reach every DC alive 😈
I know some of you wanted it and JSON output is now available in bloodyAD v2.1.25 thanks to mHiluxS
github.com/SySS-Researc... is really a bless for those who want to deploy BloodHound in one step
Tired to deal with the clock skew for Kerberos so github.com/CravateRouge... will attempt to synchronize its clock to the server now
New article for those curious about what they can find in the AD Recycle Bin (Bonus: I updated bloodyAD so you can play on this😉)
www.linkedin.com/feed/update/...
Exploiting BadSuccessor from A to Z with NT hash of impersonated accounts using bloodyAD v2.1.16
github.com/CravateRouge...
BadSuccessor in Python with bloodyAD
Have fun :D
www.linkedin.com/feed/update/...
🎉 Happy Victory Day! 🎉
The latest update to bloodyAD makes the shadowcredentials attack even smarter:
www.linkedin.com/feed/update/...
bloodyAD v2.1.8 is out with a new feature to resolve foreign SID when displaying security descriptors with "get object" or "get search" and a lifetime option on "add user" offered by
github.com/martanne
to make them vanish magically once expired
github.com/CravateRouge...
BloodyAD offers flexible authentication options, including cleartext passwords, pass-the-hash, pass-the-ticket, and certificate-based authentication.
Read more: www.helpnetsecurity.com/2025/01/28/b...
#cybersecurity #cybersecuritynews #opensource
@cravaterouge.bsky.social
Little gift just before Christmas 🎁
Learn how AD LDAP logging works, how to improve it or how to bypass it
Would be a perfect gift for Christmas 😍
🚀 Big Announcement! 🚀
After 8+ years of working on PayloadsAllTheThings, I’m excited to release it as an ebook on Leanpub! 📖✨
To celebrate, I’m gifting 2 free copies to random reposters! 🔥
👉 Repost for a chance to win
Thank you all for your incredible support! 🙌
#CyberSecurity #Infosec
Working on making bloodyAD more cross-domain friendly.
You can now retrieve DNS records on all AD domains trusting yours using 'get dnsDump --transitive'
Cross-domain transitivity works even with kerberos credentials from your initial domain.
github.com/CravateRouge...