Penguin’s secretes: Evidence collection in Linux

Date: 06/02/2025

Hey, bro, are you aware that Windows is dead? Everyone is switching to free software nowadays. You’re a hacker security guy, right? So, your job is to ensure security. And here’s an interesting case to be investigated: a Linux computer and an incident that occurred with it. Or maybe no incidents occurred, but you still have to check whether everything is clean. Do you know what to do in such situations? If not, we’ll tell you now. And even if you do, we strongly recommend to review this article anyway. It provides recipes for all occasions and presents an efficient set of powerful tools. Enjoy the reading!
Read full article →

Your guide to NTLM relay, Part 2: Delivering relay attacks

Date: 27/01/2025

NTLM relay attacks aren’t new to pentesters. In most cases, the main prerequisite for a successful relay attack isn’t a vulnerability, but an infrastructure misconfiguration; this is why such attacks are often used in real-life situations. This article discusses relay attacks and techniques used to deliver them – assuming that you have already hijacked NTLM authentication.
Read full article →

Your guide to NTLM relay: Hijacking NTLM authentication to deliver a relay attack

Date: 24/01/2025

Why NTLM authentication is still present in many infrastructures? The correct answer is: because Windows cannot exist without it. But NTLM authentication is marred by a number of problems that can be exploited by attackers. One of such problems is its vulnerability to relay attacks. This article discusses authentication hijacking techniques enabling you to deliver a relay attack.
Read full article →

Goodbye Mimikatz! Inject tickets with your own hands

Date: 16/01/2025

To implement a number of pass-the-ticket attacks, you have to inject a Kerberos ticket into the compromised system. Such tools as Mimikatz, Impacket, or Rubeus can be used for this purpose, but they are easily detected by antiviruses, thus, making this approach ineffective. In this article, I will explain how the ticket injection problem can be solved without special tools: all you need is WinAPI and some magic.
Read full article →