Skip to content

Latest commit

 

History

History
55 lines (37 loc) · 4.66 KB

File metadata and controls

55 lines (37 loc) · 4.66 KB


This repository contains a list of many methods to coerce a windows machine to authenticate to an attacker-controlled machine.
GitHub repo size YouTube Channel Subscribers

All of these methods are callable by a standard user in the domain to force the machine account of the target Windows machine (usually a domain controller) to authenticate to an arbitrary target. The root cause of this "vulnerability/feature" in each of these methods is that Windows machines automatically authenticate to other machines when trying to access UNC paths (like \\192.168.2.1\SYSVOL\file.txt).

There is currently 15 known methods in 5 protocols.


Protocols & Methods

Contributing

Feel free to open a pull request to add new methods.