
Clément Labro
@itm4n
Pentest & Windows security research
(I stopped using this account in December 2022)
➡ Mastodon: @[email protected]
ID: 927965973738610688
https://itm4n.github.io/ 07-11-2017 18:28:23
346 Tweet
7,7K Followers
167 Following

#RemotePotato0 new release! Now you can also grab and steal the NTLMv2 hashes of every user logged on a machine from an unprivileged user! ✅ works fully local - no network interaction (except win 2019) ✅ ntlm related ✅ won't fix Windows in 2k21 cc Andrea Pierini

NTLM relay over and over again! Great blog post by Sylvain Heiniger explaining a new NTLM relay attack vector over RPC using MS-DCOM... and #impacket 😀 blog.compass-security.com/2021/08/relayi…



Exploit for CVE-2021-40449 released S/O to RedDrip Team who created an exploit based on my original PoC, and then I made an exploit based on their exploit, which is based on my PoC. Funny. Features a neat technique from RedDrip that I hadn't seen before github.com/ly4k/CallbackH…


There is now a check for this in PrivescCheck (available through the "-Extended" mode). Thanks Antonio Cocomazzi ! 🙏



Cheers to Clément Labro for inspiration, topotam for PetitPotam, and James Forshaw for NtObjectManager. New post detailing #RPC auditing with NtObjectManager clearbluejar.github.io/posts/from-nto…








The python BloodHound ingestor was updated to support GPO/OU/container collection. Thanks to Thomas Seigneuret for the PR. The python version is now functionally equivalent to the official C# version for DCOnly collection. Also thanks to Clément Labro who added registry based session enum 🔥

I didn't want to rush it. Though, I finally took the decision to leave Twitter. 😢 See you on the other side. 👋 @[email protected] infosec.exchange/@itm4n#