• “No more Pass-the-Hash” – Exploring the limitations of Remote Credential Guard

    Remote Credential Guard was recently introduced by Microsoft to mitigate the risk of credential theft from machines that are accessed through RDP. In essence, this feature enables RDP connections without leaving credentials on target servers. Instead, the credentials remain on …

  • Service Accounts – Weakest Link in the Chain?

    At DerbyCon 2014, Tim Medin introduced a novel technique to elevate privileges by exploiting service accounts in Windows networks leveraging Active Directory and Kerberos. This method requires the service to be executed in the security context of a user account …

  • Kerberos Attacks: What You Need to Know

    Privileged account exploitation is at the center of targeted cyber attacks, and post-mortems of today’s most high-profile breaches – from Sony Pictures to Office of Personnel Management (OPM) – reveal an increasingly predictable pattern.  Attackers crash through the network perimeter, …