Explore tweets tagged as #UnconstrainedDelegation
@CCNADailyTIPS
Oscar🇩🇴
5 years
0
0
1
@vysecurity
Vincent Yiu
6 years
Sharphound: "MATCH (c:Computer {unconstraineddelegation:true}) return c". Find all those boxes and use them for Print Spooler fun!
0
15
46
@aas_s3curity
aas
4 years
As a reminder, if you have a machine with #UnconstrainedDelegation, you can compromise the whole domain thanks to #PetitPotam just like you did with #PrintSpooler service. (1/6)
1
5
16
@Anastasis_King
Anastasis Vasileiadis (Cyberkid)
4 months
1
0
1
@HackAndDo
Pixis
7 years
Après avoir présenté la #délégation #kerberos, voici un nouvel article expliquant les risques associés à la délégation sans contrainte (#unconstraineddelegation) avec un exemple concret pour bien saisir les conséquences de cette fonctionnalité. 🙃 https://t.co/q4HAYoTb27
0
19
32
@_wald0
Andy Robbins
7 years
(2/2) MATCH (dc:Computer)-[:MemberOf*1..]->(g:Group) WHERE g.objectsid ENDS WITH "516" WITH COLLECT(dc) as domainControllers MATCH p = (d:Domain)-[:Contains*1..]->(c:Computer {unconstraineddelegation:true}) WHERE NOT c in domainControllers RETURN COUNT(p)
0
15
47
@SOC_Prime
SOC Prime
2 years
Download a dedicated Rule Pack for #ELKStack to identify red flags of the possible unconstrained delegation attack against your company infrastructure. https://t.co/KrM6rFIOZH #UnconstrainedDelegation #SecOps #cybersecurity #SOC @elastic
0
0
2
@n00py1
n00py
4 years
MATCH (c1:Computer)-[:MemberOf*1..]->(g:Group) WHERE g.objectid ENDS WITH '-516' WITH COLLECT( https://t.co/behtbhBfXo) AS domainControllers MATCH (c2:Computer {unconstraineddelegation:true}) WHERE NOT https://t.co/QQMQuBP2vd IN domainControllers RETURN c2 Mark as high value.
1
1
10
@_nwodtuhs
Charlie Bromberg « Shutdown »
3 years
// Unconstrained Delegation MATCH (c {unconstraineddelegation:true}) return c // Constrained Delegation (with Protocol Transition) MATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c
1
2
10
@AdityaBaronia
Aditya Baronia
2 years
0
0
0
@AdityaBaronia
Aditya Baronia
2 years
#UnconstrainedDelegation Allows a service(helpdesk staff) to impersonate a user and access any resource on behalf of specific service(Account Operator). Now helpdesk can create, modify, and delete accounts since there is no constrain
1
0
0
@jmpsecurity
Jacob P
3 years
MATCH (dc:Computer)-[:MemberOf*1..]->(g:Group) WHERE g.objectsid ENDS WITH "516" WITH COLLECT(dc) as domainControllers MATCH p = (d:Domain)-[:Contains*1..]->(c:Computer {unconstraineddelegation:true}) WHERE NOT c in domainControllers SET c.highvalue = true RETURN c 2/3
1
0
0
@SOC_Prime
SOC Prime
4 years
Download a dedicated Rule Pack for #ELKStack from Threat Detection Marketplace to identify red flags of the possible unconstrained delegation attack against your company infrastructure. https://t.co/KrM6rFIOZH #UnconstrainedDelegation #SecOps #cybersecurity #SOC @elastic
0
0
3