Skip to content

0xdeaddood

Menu
  • Blog
  • Talks
  • Advisories
  • About
Menu

Category: Authentication

Forging Tickets in 2023

Posted on May 11, 2023May 11, 2023 by 0xdeaddood

Some time ago, Microsoft released a security patch that changed the way Kerberos tickets are created and validated. Bye-bye golden tickets! Bye-bye golden tickets? Let’s see how to forge tickets in 2023 with Impacket.

Continue reading

Relaying Everything: Coercing Authentications Episode 1 – MSSQL

Posted on February 28, 2023January 12, 2024 by 0xdeaddood

A new PR merged: MSSQL and the xp_dirtree procedure. You know the rest. Let’s talk about NTLM authentication coercion methods using Impacket.

Continue reading

We love relaying credentials: A technical guide to relaying credentials everywhere

Posted on May 16, 2022March 11, 2023 by 0xdeaddood

NTLM relay is a well-known technique that has been with us for many years and never seems to go away. In this article you’ll find a technical guide on how to relaying credentials everywhere in 2022.

Continue reading

The Kerberos Key List Attack: The return of the Read Only Domain Controllers

Posted on November 11, 2021June 15, 2023 by 0xdeaddood

Some time ago Microsoft released a new feature that allows SSO to on-premises resources using security keys. This brought with it the return of the Read Only Domain Controllers and a new credential gathering vector. Let’s take a look at The Kerberos Key List attack.

Continue reading

One SMB connection multiple relays

Posted on April 7, 2020March 11, 2023 by 0xdeaddood

The NTLM relay attack is a well-known attack method that has been around for many years… and never seems to go away. So, why not explore new approaches to this attack technique? Let me introduce you to the SMB multi-relay feature.

Continue reading

The Reddit incident or how to move beyond 2FA

Posted on August 9, 2018March 11, 2023 by 0xdeaddood

In mid-June, an attacker broke into a few of Redditโ€™s systems and managed to access some user data using compromised employee accounts. It could be another data breach, but it’s not. Why? The compromised accounts were protected by SMS-based 2FA. Is basic two-factor authentication no longer enough?

Continue reading

Bypass Two-Factor Authentication using real-time phishing

Posted on April 4, 2018March 11, 2023 by 0xdeaddood

For some time, websites that used 2FA reported a significant drop in phishing attacks. However, as soon as new security technologies emerge, new techniques arise to exploit them. Real-time phishing is a tactic that allows scammers to bypass 2FA. How do they do it?

Continue reading

Security Researcher ๐Ÿดโ€โ˜ ๏ธ 

Authentication & Identity ๐Ÿ”‘ | Threat Hunting ๐Ÿ‘น | Malware Reversing ๐Ÿ‘พ | Impacket ๐Ÿš€

Recent Posts

  • Impacket v0.11.0 Now Available
  • Forging Tickets in 2023
  • Relaying Everything: Coercing Authentications Episode 1 – MSSQL

Archives

Categories

  • Authentication
  • Bitcoin
  • Data breach
  • Impacket
  • Malware
  • Phishing
  • Vuln disclosure
Tweets by 0xdeaddood
© 2025 0xdeaddood | Powered by Minimalist Blog WordPress Theme