adfs

NTLMv1 vs NTLMv2: Digging into an NTLM Downgrade Attack
emmaline | | Active Directory, adfs, corporate security, DFSCoerce, NTLM, Red Team, relaying attacks, Tools & Techniques
Overview During the summer, my colleague Derya Yavuz and I published an article on some of the different methods we’ve leveraged to elevate privileges within Active Directory environments. We discussed authentication coercion ...

Elevating Privileges with Authentication Coercion Using DFSCoerce
emmaline | | adfs, Authentication, corporate security, DFSCoerce, Privilege Escalation, relaying attacks, Tools & Techniques
Background In our previous blog post, we talked about the recently-published DFSCoerce utility which is useful for forcing NTLM or Kerberos authentication by interacting with the Distributed File Service (DFS) over Remote ...

How to Detect DFSCoerce
Background On 18 June 2022, security researcher Filip Dragovic published proof-of-concept code for a new forced authentication technique named DFSCoerce. This technique, inspired by other forced authentication techniques like PetitPotam and SpoolSample, ...

Relaying to ADFS Attacks
Overview During red team engagements over the last few years, I’ve been curious whether it would be possible to authenticate to cloud services such as Office365 via a relay from New Technology ...
Security Advisory: Targeting AD FS With External Brute-Force Attacks
On July 2019 Patch Tuesday, Microsoft released a patch for CVE-2019-1126, an important vulnerability discovered by Preempt Research Labs. The vulnerability discovered leads to security issues that create a wide scale denial-of-service ...

One Organization’s Dilemma: Adding Security for Cloud Apps With Less User Disruption
Late last year, we began conversations with the Tuck School of Business at Dartmouth College about their current security concerns. Like many organizations, a portion of their workloads are moving from on-premises ...

How to Configure Microsoft Active Directory Federation Services Single Sign-On Integration with SAML
Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators ...