Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/safebuffer/sam-the-admin
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
https://github.com/safebuffer/sam-the-admin
active-directory exploitation redteam s4u2self
Last synced: 1 day ago
JSON representation
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
- Host: GitHub
- URL: https://github.com/safebuffer/sam-the-admin
- Owner: safebuffer
- Created: 2021-12-11T15:10:30.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-07-10T22:23:13.000Z (over 2 years ago)
- Last Synced: 2024-07-30T14:18:31.756Z (4 months ago)
- Topics: active-directory, exploitation, redteam, s4u2self
- Language: Python
- Homepage:
- Size: 17.6 KB
- Stars: 969
- Watchers: 26
- Forks: 190
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - safebuffer/sam-the-admin - Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user (Python)
README
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
[![asciicast](https://asciinema.org/a/SnQ66XtmZLzXZQ8QwWwAYs8Dm.svg)](https://asciinema.org/a/SnQ66XtmZLzXZQ8QwWwAYs8Dm)
### Known issues
- it will not work outside kali , i will update it later on :)#### Check out
- [CVE-2021-42287/CVE-2021-42278 Weaponisation ](https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisation.html)
- [sAMAccountName spoofing](https://www.thehacker.recipes/ad/movement/kerberos/samaccountname-spoofing)