An Operator’s Guide to Device-Joined Hosts and the PRT Cookie

An Operator’s Guide to Device-Joined Hosts and the PRT Cookie

|
IntroductionAbout five years ago, Lee Chagolla-Christensen shared a blog detailing the research and development process behind his RequestAADRefreshToken proof-of-concept (POC). In short, on Entra ID joined (including hybrid joined) hosts, it’s possible to obtain a primary refresh token (PRT) cookie from the logged in user’s logon session, enabling an attacker ... Read More
BOFHound: AD CS Integration

BOFHound: AD CS Integration

|
TL;DR: BOFHound can now parse Active Directory Certificate Services (AD CS) objects, manually queried from LDAP, for review and attack path mapping within BloodHound Community Edition (BHCE).BackgroundMy last BOFHound-related post covered the support and usage strategies for Beacon object files (BOFs) enabling the manual collection of data required for BloodHound’s AdminTo ... Read More
BOFHound: Session Integration

BOFHound: Session Integration

|
BackgroundIf you’ve found yourself on a red team assessment without SharpHound (maybe due to OPSEC or stealth requirements), you’d probably agree that mapping Active Directory is significantly more difficult. Tying down nested group memberships and trying to map ACL-based attack paths can become exceedingly complex outside of BloodHound’s user interface ... Read More
#OBTS v5.0: "Lock Picking the macOS Keychain" - Cody Thomas

Abusing Slack for Offensive Operations: Part 2

| | Red Team, research
When I first started diving into offensive Slack access, one of the best public resources I found was a blog post by Cody Thomas from back in 2020 (which I highly recommend giving a read). This follow-up post aims to take a look at changes Slack has implemented since Cody’s ... Read More