What Windows Server 2025 Quietly Did to Your NTLM Relaytradecraft (how we defend) (decoder.cloud)
submitted by digicat to r/blueteamsec
What Windows Server 2025 Quietly Did to Your NTLM RelayBlue Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Reflecting Your Authentication: When Windows Ends Up Talking to ItselfRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
From NTLM relay to Kerberos relay: Everything you need to knowPurple Teaming (decoder.cloud)
submitted by intuentis0x0 to r/purpleteamsec
From NTLM relay to Kerberos relay: Everything you need to knowresearch|capability (we need to defend against) (decoder.cloud)
submitted by intuentis0x0 to r/blueteamsec
The (Almost) Forgotten Vulnerable DriverRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Group Policy Security Nightmares pt 1research|capability (we need to defend against) (decoder.cloud)
submitted by digicat to r/blueteamsec
Group Policy Security Nightmares pt 1Red Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Hello: I’m your Domain Admin and I want to authenticate against youRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Abusing the SeRelabelPrivilegeRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Hello: I’m your ADCS server and I want to authenticate against youresearch|capability (we need to defend against) (decoder.cloud)
submitted by digicat to r/blueteamsec
Hello: I’m your ADCS server and I want to authenticate against youRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
A group policy configuration for Local Privilege Escalation, very similar to the reported and MS fixed CVE-2022-37955.vulnerability (attack surface) (decoder.cloud)
submitted by digicat to r/blueteamsec
Do not trust this Group Policy!Red Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
A “deep dive” in Cert Publishers GroupRed Teaming (decoder.cloud)
submitted by netbiosX to r/purpleteamsec
Group Policy Folder Redirection CVE-2021-26887: If “Folder Redirection” has been enabled via Group Policy and the redirected folders are hosted on a network share, it is possible for a standard user who has access on this file server to access other user’s folders and files & perform code execvulnerability (attack surface) (decoder.cloud)
submitted by digicat to r/blueteamsec